builder
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXPOSURE]: The skill includes code examples that reference accessing sensitive local credential files.
- Evidence: Reference to
credentials.jsoninSKILL.mdfor Google Calendar API authentication within the automation script pattern. - [COMMAND_EXECUTION]: The skill is configured to generate and execute arbitrary scripts and deployment commands.
- Evidence: Instructions encourage running generated scripts (e.g.,
python standup.py) and utilizing CLI tools likegh-pages,netlify, andvercelfor static site deployment. - Note: Deployment targets (GitHub, Netlify, Vercel) are recognized well-known services.
- [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection due to processing untrusted data with high-privilege tool access.
- Ingestion points: Processes data from Google Calendar events, BigQuery analysis results, SQL databases, and CSV files as specified in the 'Data-to-Deck Pipeline' and examples.
- Boundary markers: No explicit delimiters or instructions to ignore instructions embedded in the ingested data are defined.
- Capability inventory: The skill uses
Write,Edit, andBash(npm/node) which allow for the creation and execution of scripts based on ingested content. - Sanitization: There is no mention of sanitization or validation of external data before it is processed or used in code generation.
Audit Metadata