internal-comms
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTION
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is highly vulnerable to Indirect Prompt Injection due to its reliance on external, untrusted data sources.
- Ingestion points: The skill explicitly instructs the agent to read from
Slack(channels and threads),Email,Google Drivedocuments, andExternal News(referenced inexamples/3p-updates.md,examples/company-newsletter.md, andexamples/faq-answers.md). - Boundary markers: There are no instructions or system delimiters provided to help the agent distinguish between the skill's instructions and the content of the data it is processing. It lacks 'ignore embedded instructions' warnings.
- Capability inventory: While the skill itself does not contain executable code, its outputs are high-impact. It generates content for 'Company Newsletters' (sent to 1000+ people), 'Leadership Updates', and 'FAQ' documents. An attacker could use a Slack post or email to inject instructions that the agent then propagates to the entire organization.
- Sanitization: There is no evidence of filtering, validation, or sanitization of the content retrieved from these external tools before it is formatted into the final communication pieces.
Recommendations
- AI detected serious security threats
Audit Metadata