skills/mukul975/anthropic-cybersecurity-skills/implementing-google-workspace-sso-configuration/Gen Agent Trust Hub
implementing-google-workspace-sso-configuration
Pass
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to the way it processes external data.
- Ingestion points:
scripts/agent.pyreads JSON configuration and log files via CLI arguments;scripts/process.pyfetches and parses external SAML metadata XML from user-provided URLs. - Boundary markers: Absent. There are no delimiters or instructions for the agent to ignore potentially malicious instructions embedded within the metadata or log files.
- Capability inventory: The skill scripts perform file system read/write operations (
scripts/agent.py) and network GET/HEAD requests (scripts/process.py). - Sanitization: Absent. The XML parsing in
scripts/process.pyuseslxml.etree.fromstringwithout explicit configuration to disable external entities (XXE protection), and the JSON parsing lacks schema validation for the processed logs. - [DATA_EXFILTRATION]:
scripts/process.pycontains functionality to perform network requests to external domains provided by the user. - Evidence: The
validate_idp_metadatamethod usesrequests.get(metadata_url)and thevalidate_sso_configurationmethod usesrequests.head(idp_sso_url)to verify external Identity Provider endpoints. While functional for SSO validation, this allows the agent to interact with arbitrary non-whitelisted domains.
Audit Metadata