inno-rclone-to-overleaf
Fail
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill requires the user to grant "Always Allow" keychain access to the
pyoverleaftool on macOS. This enables persistent extraction of browser cookies (sensitive authentication credentials) from the system keychain. - [EXTERNAL_DOWNLOADS]: The skill downloads and installs an external package
pyoverleaffrom a third-party repository (github.com/jkulhanek/pyoverleaf) without verification of the source's trustworthiness or integrity. - [COMMAND_EXECUTION]: The skill uses the
run_terminaltool to execute various CLI commands and a bundled bash script (scripts/sync-to-overleaf.sh) for syncing files, creating a broad attack surface for shell-based interactions. - [DATA_EXFILTRATION]: The skill has the capability to read sensitive authentication cookies and local project files, and transmit them to external Overleaf servers, which could be abused to exfiltrate data.
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through the processing of untrusted data.
- Ingestion points: Reads content from LaTeX files on Overleaf using
pyoverleaf read(referenced inSKILL.md). - Boundary markers: Absent. No delimiters or instructions are used to separate user data from agent instructions.
- Capability inventory: Includes
run_terminalfor shell execution,write_filefor file system modification, and network access via thepyoverleafCLI. - Sanitization: Absent. External content from LaTeX files is read and potentially used in the agent's context without validation or filtering.
Recommendations
- AI detected serious security threats
Audit Metadata