coda
Audited by Gen Agent Trust Hub on Feb 13, 2026
The Coda skill provides a Python command-line interface (scripts/coda_cli.py) to interact with the Coda API. The analysis reveals the following:
1. Command Execution (LOW): The core functionality of this skill involves executing a local Python script (scripts/coda_cli.py). This is a form of command execution. However, the script is provided as part of the skill, is auditable, and does not execute arbitrary shell commands or download and run external, unverified scripts. It uses standard Python libraries and argparse for command handling, limiting the scope of execution to its defined functions.
2. Unverifiable Dependencies (LOW/INFO): The SKILL.md mentions Python 3.7+ with requests library installed as a prerequisite. The coda_cli.py script attempts to import the requests library but includes a fallback to urllib.request if requests is not available. While requests is a widely used and generally trusted Python library, it is an external dependency that the user is expected to install. Given the fallback mechanism and the trusted nature of the library, this is considered a low risk.
3. Data Handling and Credentials (INFO):
* Credentials: The skill requires a CODA_API_TOKEN to be set as an environment variable. The SKILL.md explicitly advises against committing this token to version control and warns that the token has 'full access to all docs the user can access'. This demonstrates good security practice and transparency regarding credential handling, rather than an unsafe practice by the skill itself.
* Data Exposure: The skill's purpose is to manage Coda data (docs, tables, rows), which inherently involves reading and writing potentially sensitive information to and from the Coda API. The SKILL.md includes a 'Security Considerations' section that warns about 'Data Exposure: Row data may contain sensitive information; handle exports carefully.' All network requests are directed to the official https://coda.io/apis/v1/ endpoint. The script can output data to standard output (e.g., as JSON or CSV), which is an expected function but means the data is exposed to the agent's environment. This is an inherent function of the skill, not a malicious exfiltration attempt to an untrusted third party.
4. No Obfuscation: No obfuscation techniques (Base64, zero-width characters, homoglyphs, etc.) were detected in any of the provided files.
5. No Privilege Escalation or Persistence: The script does not contain commands for privilege escalation (e.g., sudo, chmod 777) or persistence mechanisms (e.g., modifying .bashrc, creating cron jobs).
6. No Prompt Injection: The SKILL.md and Python script do not contain any patterns indicative of prompt injection attempts.
7. No Time-Delayed / Conditional Attacks: No suspicious time-based or conditional logic designed to trigger malicious behavior under specific circumstances was found.
Conclusion: The skill is well-documented, transparent about its security implications, and includes safety features (e.g., confirmation for delete operations). The primary risk is the execution of a local script, which is auditable, and the use of an external Python library, which is common and has a fallback. The handling of sensitive data and API tokens is done with appropriate warnings and standard practices.