google-workspace

Fail

Audited by Snyk on Mar 1, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E006: Malicious code pattern detected in skill scripts.

  • Malicious code pattern detected (high risk: 1.00). This code intentionally routes OAuth flows and refresh tokens through a third‑party cloud function (DEFAULT_CLOUD_FUNCTION_URL) — explicitly POSTing refresh tokens and relying on an external endpoint for token refresh — which constitutes deliberate exfiltration of sensitive credentials and enables remote control/refresh of user credentials (high-risk backdoor-like behavior).

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.80). The skill's exec runner and examples (scripts/workspace.js and SKILL.md) explicitly call Google Workspace APIs (e.g., workspace.call('drive', ...), docs, gmail) to fetch user-generated third-party content (Drive/Docs/Gmail) that the agent is expected to read and could materially influence subsequent tool use or decisions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Mar 1, 2026, 11:18 AM