pp-pagliacci
Warn
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches and installs the
pagliacci-pp-clitool usingnpxfrom the@mvanhorn/printing-presspackage and viago installfrom thegithub.com/mvanhorn/printing-press-libraryrepository. - [DATA_EXFILTRATION]: The CLI tool provides a
--deliver webhook:<url>flag that allows the agent to send command outputs, which may contain sensitive order history or delivery addresses, to an arbitrary external URL. - [DATA_EXFILTRATION]: Supports a feedback mechanism that can transmit data to a remote server defined by the
PAGLIACCI_FEEDBACK_ENDPOINTenvironment variable. - [COMMAND_EXECUTION]: Requires the installation and execution of a custom binary (
pagliacci-pp-cli) to interact with the pizza service. - [CREDENTIALS_UNSAFE]: The
auth login --chromecommand is designed to extract sensitive authentication cookies directly from the user's Google Chrome browser session. - [PROMPT_INJECTION]: The skill ingests untrusted data from the Pagliacci API (such as menus and order history) that is subsequently processed by the agent, creating a surface for indirect prompt injection.
- Ingestion points: Data from
store list,menu cache, andorders listenter the agent context via SKILL.md instructions. - Boundary markers: Absent; the skill does not use delimiters to isolate external data from instructions.
- Capability inventory: Executes shell commands via the
Read Bashtool. - Sanitization: Absent; API responses are passed to the agent without filtering or validation.
Audit Metadata