stripe-integration
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- Indirect Prompt Injection (LOW): The skill processes external data via Stripe webhooks to trigger database updates.
- Ingestion points: The
templates/webhook_handler.tsfile accepts raw request bodies from external POST requests. - Boundary markers: The implementation correctly uses
stripe.webhooks.constructEvent()with a secret key to verify the authenticity of the payload before processing, providing a strong cryptographic boundary. - Capability inventory: The skill is capable of updating user subscription statuses and customer IDs in the database (
db.update(users)). - Sanitization: Input is validated through Stripe's signature verification; however, the data is directly used to update database fields after verification.
- Data Exposure (LOW): The helper script
scripts/verify_webhook.pyaccepts the Stripe webhook secret as a command-line argument. While intended for testing, this practice can expose sensitive credentials in shell history or process monitoring tools on shared systems.
Audit Metadata