growth-at-scale
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (HIGH): The skill instructs the user to configure MCP servers that download and execute packages from npm using
npx -y. These packages are from the@anthropicorganization. Note that the trusted organization list identifies 'anthropics' (plural) as trusted, but 'anthropic' (singular) is an exact match failure, classifying these as untrusted sources. - Evidence: Commands such as
npx -y @anthropic/mcp-google-adsinSKILL.md. - [REMOTE_CODE_EXECUTION] (HIGH): Using
npx -ywith external packages allows arbitrary code execution on the host machine during the setup and execution of growth tools. - [COMMAND_EXECUTION] (HIGH): The skill requires modifying the agent's core configuration file (
~/.claude/settings.json). This acts as a persistence mechanism, ensuring that external and potentially malicious code is loaded and executed in every future session. - [PROMPT_INJECTION] (LOW): The skill is vulnerable to indirect prompt injection (Category 8) due to its data ingestion surface.
- Ingestion points: Untrusted content provided to
/social post,/newsletter draft, and social media inputs. - Boundary markers: No explicit delimiters or 'ignore embedded instruction' warnings are used in the provided examples.
- Capability inventory: Extensive network and system access through Google Ads, Meta Ads, Twitter APIs, HubSpot, and full browser automation via
mcp__claude-in-chrome. - Sanitization: No evidence of content sanitization or validation before transmission to external platforms.
- [DATA_EXFILTRATION] (MEDIUM): The
references/api-research.mdfile demonstrates patterns for handling sensitive API keys (Google Ads, Meta, Twitter, Buttondown) via environment variables, which are then passed to external CLI and curl commands, creating an exposure surface for credentials. - [DYNAMIC_EXECUTION] (MEDIUM): The skill utilizes browser automation (
mcp__claude-in-chrome) for platforms without APIs (e.g., Substack, Product Hunt). This involves dynamic interaction with web forms and system clicking, which can be hijacked if the agent processes malicious instructions.
Recommendations
- AI detected serious security threats
Audit Metadata