rollbar-reader
Warn
Audited by Gen Agent Trust Hub on Mar 26, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The skill dynamically constructs shell commands using variables derived from user-provided arguments such as
SINCE,UNTIL, andOUT_DIR. Specifically, the commandsdate -d "<SINCE>" +%sandmkdir -p <OUT_DIR>/occurrencesare vulnerable to command injection if these variables contain shell metacharacters (e.g., backticks, semicolons). - [EXTERNAL_DOWNLOADS]: The skill is designed to automatically install the
@delexw/rollbar-clipackage from the npm registry if it is not detected on the system. While this is the primary tool for the skill, it involves downloading and executing code from a remote repository at runtime. - [PROMPT_INJECTION]: The skill exhibits a surface for indirect prompt injection. It retrieves and analyzes data from the Rollbar API, including error messages, stack traces, and occurrence details. If an attacker can control the content of an error logged to Rollbar, they could potentially embed instructions that influence the agent's subsequent actions during the analysis phase.
- Ingestion points: Data is ingested via
rollbar items listandrollbar occurrences getcommands (documented in SKILL.md). - Boundary markers: None are present to distinguish between trusted instructions and untrusted data from the API.
- Capability inventory: The agent has access to
Bash(shell),Read,Write, andEdittools. - Sanitization: There is no mention of sanitizing or escaping the data retrieved from Rollbar before processing it.
- [DATA_EXFILTRATION]: The skill manages sensitive Rollbar project and account tokens. Although the instructions explicitly warn against exposing token values, the agent is directed to use shell commands like
rollbar config set-token <project> <token>to configure the environment, which could lead to tokens being stored in shell history or visible in process lists.
Audit Metadata