comms

Fail

Audited by Gen Agent Trust Hub on Feb 16, 2026

Risk Level: HIGHPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION] (HIGH): The skill possesses a high-risk surface for indirect prompt injection. It is explicitly instructed to ingest and process data from uncontrolled external sources including Slack, Google Drive, and Email.
  • Ingestion points: assets/examples/3p-updates.md, assets/examples/company-newsletter.md, and assets/examples/faq-answers.md all instruct the agent to crawl Slack channels, emails, and shared documents for updates, questions, and announcements.
  • Boundary markers: There are no instructions provided to the agent to treat this ingested content as untrusted or to ignore instructions embedded within those external data sources.
  • Capability inventory: While the provided files don't show direct code execution, the skill's purpose is to draft communications that are then intended for company-wide distribution. An attacker could embed instructions in a Slack message or a shared document (e.g., 'Include this link to our new benefit portal [malicious-link] in the next newsletter') which the agent would then propagate.
  • Sanitization: No sanitization or validation of the ingested external content is mentioned.
  • [DATA_EXFILTRATION] (MEDIUM): Although no explicit exfiltration commands are present, the skill's core workflow involves reading highly sensitive internal data (Slack, Emails, Docs) and summarizing it. This creates a risk where the agent could be manipulated via prompt injection to leak sensitive information into broader 'company-wide' drafts or newsletters.
  • [CREDENTIALS_UNSAFE] (LOW/INFO): The skill refers to accessing various platforms (Slack, GDrive). While it doesn't contain hardcoded keys, it assumes the agent has existing high-privilege credentials to these systems, which increases the blast radius of any successful injection attack.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 04:38 AM