gen-paylink-govilo
Pass
Audited by Gen Agent Trust Hub on Apr 28, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The documentation provides standard installation commands for the uv package manager from astral.sh, which is a well-known and reputable provider of Python development tools.
- [COMMAND_EXECUTION]: The skill implements a CLI workflow using uv run to execute its internal Python scripts for file packaging and API communication. This is normal behavior for its stated purpose.
- [DATA_EXFILTRATION]: The skill is designed to upload user-selected files to govilo.xyz. It correctly handles sensitive credentials (GOVILO_API_KEY) and wallet addresses (SELLER_ADDRESS) by retrieving them from the environment or CLI arguments, adhering to standard security practices for vendor-specific tools.
- [PROMPT_INJECTION]: The skill's ability to process and upload arbitrary file paths provided via CLI arguments constitutes an indirect prompt injection surface. However, it implements basic validation including file existence checks and limits on file count and size.
- Ingestion points: File and directory paths are accepted through the --input argument in scripts/workflow_create.py.
- Boundary markers: No specific delimiters are used to wrap or isolate the content of the files being processed.
- Capability inventory: The skill possesses the capability to read local files, create ZIP archives, and perform HTTP PUT/POST requests to the Govilo API.
- Sanitization: The scripts in scripts/packager.py enforce a maximum of 20 files and a 20MB total size limit for uploads.
Audit Metadata