stripe-reconcile
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill relies on 'audit findings' from an external source to drive automated actions. In Step 3, it uses
codex exec --full-autowith a prompt constructed directly from these findings (e.g., 'Fix: [specific issue from audit]'). An attacker who can influence the audit report (e.g., via malicious comments in code or database metadata) could inject instructions to execute arbitrary code or exfiltrate data. \n- Command Execution (HIGH): The skill performs sensitive production operations usingnpx convex env set --prodandstripe webhook_endpoints update. These commands allow the agent to modify production infrastructure based on potentially untrusted input. \n- Data Exfiltration (MEDIUM): The verification step usesnpx convex env list --prod | grep STRIPE, which reads production secrets into the agent's context. If combined with the network capability in Step 4 (curl -I -X POST <url>), there is a risk of production secret exfiltration. \n- Privilege Escalation (MEDIUM): The skill assumes broad permissions to modify production environments and execute code viacodex, which is a powerful utility capable of making sweeping changes to the filesystem. \n- Indirect Prompt Injection Evidence Chain: \n - Ingestion points: Audit findings (processed in Triage and Step 3). \n
- Boundary markers: Absent; instructions are interpolated directly into prompts. \n
- Capability inventory:
npx convex(prod env access),codex exec(code write/exec),pnpm(package management),curl(network access). \n - Sanitization: Absent; findings are used directly in shell command arguments.
Recommendations
- AI detected serious security threats
Audit Metadata