appscript
Pass
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Recommends the installation of
@google/claspand@types/google-apps-scriptfrom the official npm registry. These are well-known packages used for Google Apps Script development. - [COMMAND_EXECUTION]: Provides instructions for executing various CLI commands via
clasp, including authentication (clasp login), project management (clasp push,clasp deploy), and remote execution (clasp run). These are standard operations for the tool's primary purpose. - [PROMPT_INJECTION]: The code templates provided in
SKILL.mdpresent a surface for indirect prompt injection. - Ingestion points: Data enters the script context through
doPost(webhooks),onFormSubmit(form inputs), andUrlFetchApp.fetch(external API data). - Boundary markers: No delimiters or isolation instructions are present in the example code snippets.
- Capability inventory: The generated scripts possess capabilities to read/write in
SpreadsheetApp, send emails viaGmailApp, and perform network requests viaUrlFetchApp. - Sanitization: The provided examples lack validation or sanitization of input data before it is used in further operations or stored in Google Sheets.
Audit Metadata