stripe-integration

Pass

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: LOWPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
  • Indirect Prompt Injection (LOW): The skill processes external data via Stripe webhooks to trigger database updates.
  • Ingestion points: The templates/webhook_handler.ts file accepts raw request bodies from external POST requests.
  • Boundary markers: The implementation correctly uses stripe.webhooks.constructEvent() with a secret key to verify the authenticity of the payload before processing, providing a strong cryptographic boundary.
  • Capability inventory: The skill is capable of updating user subscription statuses and customer IDs in the database (db.update(users)).
  • Sanitization: Input is validated through Stripe's signature verification; however, the data is directly used to update database fields after verification.
  • Data Exposure (LOW): The helper script scripts/verify_webhook.py accepts the Stripe webhook secret as a command-line argument. While intended for testing, this practice can expose sensitive credentials in shell history or process monitoring tools on shared systems.
Audit Metadata
Risk Level
LOW
Analyzed
Feb 16, 2026, 01:11 PM