automate-whatsapp
Pass
Audited by Gen Agent Trust Hub on May 16, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is designed to build automation workflows that process untrusted data from external WhatsApp users.
- Ingestion points: User input is captured via
inbound_messagetriggers andwait_for_responsenodes, then stored in execution variables likevars.user_reply(as documented inSKILL.mdandassets/workflow-linear.json). - Boundary markers: The provided system prompt examples for agent nodes (e.g., in
assets/workflow-customer-support-intake-agent.jsonandassets/workflow-api-template-wait-agent.json) interpolate these untrusted variables directly into the prompt without using delimiters or instructions to ignore embedded commands. - Capability inventory: Agent nodes can utilize tools to send messages, manage execution variables, and call external app integrations such as Slack or HubSpot.
- Sanitization: There is no evidence of input validation, escaping, or content filtering in the provided documentation or code examples.
- [EXTERNAL_DOWNLOADS]: The
scripts/openapi-explore.mjsutility is configured to fetch OpenAPI specifications from the vendor's documentation site atdocs.kapso.aito enable discovery of platform API capabilities. - [COMMAND_EXECUTION]: The skill includes various Node.js scripts in the
scripts/directory that wrap the Kapso Platform API. Some of these scripts, includingcreate-function.jsandupdate-graph.js, read local files provided by the user to facilitate resource deployment and configuration management.
Audit Metadata