groq-common-errors
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill provides a solution that echoes the GROQ_API_KEY variable to verify it is set correctly. This action exposes the plaintext API key in the command output and session history.
- [DATA_EXFILTRATION]: The command
env | grep GROQis used to inspect the local configuration. This exposes environment variables containing sensitive service credentials to the agent's context and logs. - [COMMAND_EXECUTION]: The skill utilizes the Bash tool to execute
curlfor status checks andgrepfor searching environment variables. While targeting official Groq domains, these commands facilitate the exposure of secrets. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it is designed to process untrusted data from error logs.
- Ingestion points: Skill instructions direct the agent to 'Check error message and code in your logs or console'.
- Boundary markers: None present; there are no delimiters or warnings to ignore instructions embedded within the logs.
- Capability inventory: The skill has access to Bash (curl, grep) which could be misused if instructions in a log file were followed.
- Sanitization: No sanitization or validation of the log content is performed before processing.
Audit Metadata