cloud-agents
Pass
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Shell tool to execute a local bash script (
scripts/cloud-agent.sh) which invokescurl,jq,git,base64, andsips. These commands are used to interact with the Cursor REST API, process local image files, and manage the local repository state through git operations like fetch, checkout, and cherry-pick. - [DATA_EXFILTRATION]: The skill accesses the
CURSOR_API_KEYenvironment variable and transmits it toapi.cursor.com(a well-known service) via a Basic Authorization header. Additionally, the script includes functionality to read local files, encode them as Base64 strings, and upload them to the API when processing images attached to prompts. - [EXTERNAL_DOWNLOADS]: The workflow for pulling agent changes involves
git fetchandgit pullfrom remote repositories. This involves downloading and integrating code generated by the remote cloud agent into the local environment. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its integration with code generated by remote agents.
- Ingestion points: The skill fetches code changes from remote branches created by Cursor Cloud Agents (identified via the
statuscommand and integrated viagit pull). - Boundary markers: No specific boundary markers or automated verification steps are defined for the fetched code content beyond standard git diffs.
- Capability inventory: The skill possesses extensive local capabilities including full git repository access and the ability to execute network requests via
curland process files viabase64. - Sanitization: No automated sanitization or validation is performed on the code content pulled from the remote agent before it is integrated into the local workspace, relying entirely on manual user review.
Audit Metadata