linkedin-url-lookup
Fail
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides instructions to download and execute a script from a remote server using a high-risk pattern.
- Evidence: The 'Get started' section in
SKILL.mdcontains the commandcurl -s "https://code.deepline.com/api/v2/cli/install" | bashto install the required CLI tool. - [COMMAND_EXECUTION]: The skill executes multiple shell commands and local scripts.
- Evidence: Extensive use of the
deeplineCLI throughoutSKILL.mdfor data enrichment and tool execution. - Evidence: Use of
run_javascript:@$WORKDIR/expand_nicknames.jsinSKILL.mdto execute local code for name expansion. - [EXTERNAL_DOWNLOADS]: The skill interacts with various third-party APIs to resolve and verify LinkedIn profiles.
- Evidence: Network requests are documented for Apollo (
api.apollo.io), Google Custom Search (googleapis.com), Exa (api.exa.ai), PeopleDataLabs (api.peopledatalabs.com), and Apify inreferences/provider-playbook.md. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to the processing of external data without sanitization.
- Ingestion points: Input data is read from
contacts.csvas shown in severaldeepline enrichexamples inSKILL.md. - Boundary markers: No explicit markers or instructions are present to prevent the agent from following instructions embedded within the CSV data.
- Capability inventory: The skill can make network requests to multiple providers, execute the
deeplineCLI, and run local JavaScript. - Sanitization: There is no evidence of input validation or escaping for the data read from the CSV before it is interpolated into command payloads using templates like
{{First Name}}and{{Company}}.
Recommendations
- HIGH: Downloads and executes remote code from: https://code.deepline.com/api/v2/cli/install - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata