gtm-meta-skill
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted CSV data and interpolates it into LLM prompts using tools like
call_aiandcall_ai_claude_codeas described inenriching-and-researching.mdandwriting-outreach.md. - Ingestion points: CSV files processed via the
deepline enrichcommand. - Boundary markers: Prompt templates do not consistently use strict delimiters or instructions to ignore embedded commands in the data.
- Capability inventory: The agent has access to
bashexecution, web search tools, and numerous GTM provider APIs. - Sanitization: There is no evidence of input validation or escaping for the data being interpolated into the prompts.
- [COMMAND_EXECUTION]: Several components utilize dynamic execution of code or commands.
- The
claude-deepline-statusline.mjsscript reads a command from a local configuration file (~/.claude/statusline-user-command.txt) and executes it viaexecSync. - The
writing-outreach.mddocumentation recommends therun_javascripttool to execute logic stored in external files (e.g.,@${OUTPUT_DIR}/template_email.js). - [SAFE]: The skill performs data fetching from well-known and trusted sources.
- The
recipes/portfolio-prospecting.mdfile includes instructions to usecurlfor downloading company lists fromycombinator.com, which is a recognized service.
Audit Metadata