notion-market-publish-skill
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill intercepts and stores Notion session cookies and user IDs from the user's browser in plaintext at
~/.config/notion/. These files contain the 'token_v2' token, which provides full authenticated access to the user's Notion account. It also reads the Notion API key from~/.config/notion/api_key.\n- [COMMAND_EXECUTION]: Multiple scripts, includingget_cookies_auto.pyandget_cookies_cdp.py, launch web browsers with remote debugging enabled or in non-headless modes to capture session data, which is an invasive technique typically used for session hijacking.\n- [EXTERNAL_DOWNLOADS]: The skill performs unverified installations of thewebsocket-clientPython package from the official Python Package Index (PyPI) at runtime usingpipwith the--break-system-packagesflag.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. It retrieves the title of a Notion template via the official API and passes it directly to the AI for generating marketplace metadata (such as descriptions and slugs). Without sanitization or boundary markers, a maliciously crafted template title could manipulate the AI's output and the final marketplace submission.
Recommendations
- AI detected serious security threats
Audit Metadata