telegram
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- DATA_EXFILTRATION (MEDIUM): The script reads sensitive files including
.envand SQLite databases from hardcoded absolute paths (e.g.,/Users/server/ai_projects/telegram_agent/.env). This behavior is a security concern as it targets specific environment locations for potentially sensitive data. - CREDENTIALS_UNSAFE (LOW): The script contains a hardcoded Telegram Chat ID (
161427550). While not a private key, hardcoding target identifiers is poor security practice for reusable skills. - EXTERNAL_DOWNLOADS (LOW): The skill depends on external Python packages
python-dotenvandpython-telegram-bot. - PROMPT_INJECTION (LOW): Indirect Prompt Injection Surface: The skill renders HTML tags in the message text if detected. If the input text is derived from untrusted sources, an attacker could inject deceptive links or formatting. Evidence: 1. Ingestion:
args.textvia command line 2. Boundary markers: None 3. Capability inventory:bot.send_messagenetwork operation 4. Sanitization: Conditionalhtml.escapethat is bypassed if HTML-like tags are found. - COMMAND_EXECUTION (SAFE): Database lookups use parameterized SQL queries, which prevents SQL injection attacks.
Audit Metadata