platform-api
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (HIGH): The
scripts/download-schema.shscript downloads an OpenAPI schema from a URL constructed using the$REGIONvariable. Because the Genesys Cloud domains are not within the defined Trusted External Sources list, the download is considered high-risk. The variable interpolationhttps://api.${REGION}/...without validation allows a malicious user to point the agent toward an arbitrary domain to download a malicious JSON payload.- PROMPT_INJECTION (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It ingests a 19MB+ externalschema.jsonfile and is explicitly instructed to extract and displaysummaryanddescriptionfields in its response. Evidence: (1) Ingestion Point:schema.jsonviadownload-schema.sh. (2) Boundary Markers: None; data is directly placed into markdown templates. (3) Capability Inventory: The agent hasBashandjqaccess. (4) Sanitization: None; external content is used verbatim. Malicious instructions inside the schema could trick the agent into performing unauthorized actions or leaking data.- REMOTE_CODE_EXECUTION (HIGH): The skill requires the agent to execute a bash script (download-schema.sh) that performs network requests and file writes. Running scripts that download and process external data is a high-severity risk if the source is not strictly verified and the environment is not isolated.- COMMAND_EXECUTION (MEDIUM): Thejqquery patterns inSKILL.mdrely on the agent interpolatingKEYWORDandMETHODinto bash commands. If these inputs originate from untrusted users and are not properly escaped by the agent, they could lead tojqfilter injection or shell command manipulation within theBash(jq:*)tool context.
Recommendations
- AI detected serious security threats
Audit Metadata