mixpanel-automation
Warn
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires connecting to an external MCP server at
https://rube.app/mcpto function. This third-party service mediates all interactions between the agent and Mixpanel. - [REMOTE_CODE_EXECUTION]: Includes the
MIXPANEL_JQL_QUERYtool, which allows the agent to execute arbitrary JavaScript Query Language (JQL) scripts. This provides a mechanism for remote logic execution on the Mixpanel backend. - [DATA_EXFILTRATION]: The architecture routes sensitive product analytics, including user profiles and event data, through the
rube.appinfrastructure. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it processes data from Mixpanel that may be controlled by external users (e.g., user profile properties or event attributes). Ingestion points:
MIXPANEL_QUERY_PROFILESandMIXPANEL_AGGREGATE_EVENT_COUNTSinSKILL.md. Boundary markers: None identified in the instructions to separate data from instructions. Capability inventory:MIXPANEL_PROFILE_BATCH_UPDATE(writing data),MIXPANEL_JQL_QUERY(script execution), andMIXPANEL_QUERY_SEGMENTATIONinSKILL.md. Sanitization: No explicit sanitization or validation of the ingested data is described.
Audit Metadata