google-workspace
Fail
Audited by Snyk on Mar 1, 2026
Risk Level: CRITICAL
Full Analysis
CRITICAL E006: Malicious code pattern detected in skill scripts.
- Malicious code pattern detected (high risk: 1.00). This code intentionally routes OAuth flows and refresh tokens through a third‑party cloud function (DEFAULT_CLOUD_FUNCTION_URL) — explicitly POSTing refresh tokens and relying on an external endpoint for token refresh — which constitutes deliberate exfiltration of sensitive credentials and enables remote control/refresh of user credentials (high-risk backdoor-like behavior).
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.80). The skill's exec runner and examples (scripts/workspace.js and SKILL.md) explicitly call Google Workspace APIs (e.g., workspace.call('drive', ...), docs, gmail) to fetch user-generated third-party content (Drive/Docs/Gmail) that the agent is expected to read and could materially influence subsequent tool use or decisions.
Audit Metadata