outline-cli
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the system shell to execute the
outline-cliandoutline-agentbinaries for all document management and administrative tasks. - [DATA_EXFILTRATION]: The tool provides mechanisms for interacting with local files, notably via the
documents.import_filecommand which uses afilePathargument to read data, and thetmp catcommand for reading from absolute file paths. It also supports writing output to the file system using the--result-mode fileoption. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface as it retrieves and interprets content from external Outline documents. \n
- Ingestion points: Data is pulled into the agent's context through tools like
documents.search,documents.info, andcomments.listas defined inSKILL.mdandtool-playbook.md. \n - Boundary markers: There are no instructions for the agent to use delimiters or distinct markers to separate retrieved document content from its internal instructions. \n
- Capability inventory: The agent can execute shell commands via the CLI, enabling file-read operations and network interaction with the Outline API. \n
- Sanitization: No explicit sanitization or validation of the retrieved content is required before the agent processes it.
Audit Metadata