drafts-actions
Pass
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill provides an example of integrating with the Claude API that is vulnerable to indirect prompt injection. \n
- Ingestion points: The script in
SKILL.md(Claude Translation example) readsdraft.contentdirectly into an LLM prompt. \n - Boundary markers: Absent; the prompt template does not use delimiters or protective instructions to isolate untrusted draft content. \n
- Capability inventory: The action has permission to modify drafts via
draft.update(), make network requests usingHTTP.create(), and interact with the system clipboard. \n - Sanitization: User content is not sanitized for instructions before being sent to the API. \n- [COMMAND_EXECUTION]: The documentation describes action steps that enable the execution of JavaScript and AppleScript within the application environment. \n
- Evidence:
SKILL.mdandreferences/action-steps-reference.mddetail the use of script-based automation and macOS AppleScript integration for system-level tasks. \n - Evidence: The programmatic creation example in
SKILL.mddemonstrates generating and executing JavaScript steps from string templates.
Audit Metadata