papertrail
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (LOW): The skill demonstrates a workflow that fetches data from an external API (Firefox CI) and pipes it through
jqto extract identifiers which are then used as arguments for CLI commands. - Ingestion points: API call to
firefox-ci-tc.services.mozilla.comin the 'Download Taskcluster worker logs' section. - Boundary markers: Absent; data is extracted and passed directly to the next command.
- Capability inventory: Execution of
paperctlandcurlsubprocesses. - Sanitization: No evidence of shell escaping or validation for the
workerIdstring before it is passed topaperctl pull. - [Data Exposure & Exfiltration] (LOW): The skill interacts with sensitive credentials and configurations.
- Sensitive file paths: Accesses
~/.config/paperctl/config.tomland thePAPERTRAIL_API_TOKENenvironment variable. - Context: This is standard for log management tools and no exfiltration patterns were detected.
- [Command Execution] (SAFE): The skill relies on the pre-installed
paperctlCLI tool and standard utilities likecurlandjqto perform its tasks. These operations are consistent with the skill's stated purpose.
Audit Metadata