konecty-meta-view
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The script reads sensitive authentication data from specific local files. \n
- Evidence: Accesses
~/.konecty/.envand~/.konecty/credentialsto retrieveKONECTY_URLandKONECTY_TOKEN. \n - Context: These are vendor-specific configuration paths used for legitimate authentication to the Konecty platform.\n- [EXTERNAL_DOWNLOADS]: The skill performs authenticated network requests to interact with the Konecty administrative API. \n
- Evidence: Uses the
urllib.requestmodule to send GET and PUT requests to/api/admin/meta. \n - Context: Required to fetch, list, and update metadata definitions as described in the skill documentation.\n- [PROMPT_INJECTION]: The skill processes external data, creating an attack surface for indirect prompt injection. \n
- Ingestion points: Data enters the agent context through JSON files provided via the
--fileargument inscripts/meta_view.pyand through responses from the Konecty API. \n - Boundary markers: No delimiters or instructions to ignore embedded commands are present in the prompt instructions. \n
- Capability inventory: The skill has the ability to read local files and perform authenticated network write operations (PUT) to the Konecty API. \n
- Sanitization: The ingested content is parsed as JSON but does not undergo validation or sanitization before being processed.
Audit Metadata