helicone-observability
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFEDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The skill documentation references a sensitive local file path at
~/.secretsfor storing theHELICONE_API_KEY. Accessing or encouraging the use of hidden secret files increases the risk of credential exposure if the environment is misconfigured or compromised.\n- [PROMPT_INJECTION]: The skill implements patterns for interpolating dynamic, untrusted data (such asuserIdandconversationId) directly into HTTP headers likeHelicone-User-IdandHelicone-Session-Id. This creates a surface for indirect prompt injection or data poisoning of the observability dashboard.\n - Ingestion points: Dynamic headers in the
streamTextandcreateAnthropiccode blocks withinSKILL.md.\n - Boundary markers: None are present to delimit user-provided identifiers within the header strings.\n
- Capability inventory: The skill facilitates HTTPS network requests to Helicone's proxy gateways (
anthropic.helicone.ai,oai.helicone.ai,gateway.helicone.ai).\n - Sanitization: No sanitization or validation of the dynamic variables is performed before they are inserted into the request headers.
Audit Metadata