letterly-automation
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/workflow.pyscript orchestrates the automation by usingsubprocess.runto executeexporter.py,processor.py, andlinker.pyas separate Python processes.\n- [EXTERNAL_DOWNLOADS]: Thescripts/exporter.pyscript utilizes Playwright to automate the download of a CSV export fromweb.letterly.app. This is the intended primary function of the skill.\n- [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it processes external transcription data.\n - Ingestion points:
scripts/processor.pyreads transcription text and titles from the downloaded CSV files.\n - Boundary markers: The transcription content is wrapped in standard Markdown frontmatter but lacks explicit 'ignore instructions' delimiters for the body text.\n
- Capability inventory: The skill has the ability to read the local
.nexus/cache.dbdatabase, write/move files within the vault, and interact with external websites via an automated browser.\n - Sanitization: Filenames are sanitized using regex in
scripts/processor.py, but the transcription content itself is not sanitized or escaped before being written to the vault.\n- [DATA_EXPOSURE]: Thescripts/linker.pyscript reads from a local SQLite database (.nexus/cache.db) to retrieve note metadata and embeddings for semantic linking.
Audit Metadata