latchbio-integration
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill documentation instructs the user to install the
latchPython package usingpiporuv. This is a necessary dependency for interacting with the Latch platform. - [COMMAND_EXECUTION] (LOW): The skill utilizes several CLI commands (
latch login,latch init,latch register,latch execute) to manage the workflow lifecycle. These commands are executed locally by the user to authenticate and deploy code to the Latch cloud infrastructure. - [PROMPT_INJECTION] (LOW): (Category 8: Indirect Prompt Injection) The skill is designed to ingest and process untrusted external data in the form of biological files and registry records.
- Ingestion points: Data enters through
LatchFile,LatchDir, andlatch.registryAPI calls (Table.get,Record.list). - Boundary markers: The documentation does not explicitly detail the use of delimiters or 'ignore' instructions when processing file content in prompts, though standard SDK usage typically handles data as objects.
- Capability inventory: The skill can perform network operations (
latch register,execute_workflow), manage secrets (get_secret), and modify registry data (Record.update). - Sanitization: The skill relies on Latch SDK's type-safe annotations and the platform's managed execution environment to mitigate risks.
- [DATA_EXPOSURE & EXFILTRATION] (SAFE): While the skill handles sensitive genomic data, it promotes secure practices such as using a dedicated secrets manager (
get_secret) for API keys rather than hardcoding them.
Audit Metadata