whatsapp-automation

Pass

Audited by Gen Agent Trust Hub on Feb 28, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: Reference to an external MCP server endpoint (https://rube.app/mcp). This domain is not part of the provided trusted vendor list or recognized as a well-known service infrastructure provider.\n- [PROMPT_INJECTION]: Potential for indirect prompt injection through the processing of incoming WhatsApp messages.\n
  • Ingestion points: Incoming message content received via the WhatsApp Business API and processed in the reply workflow.\n
  • Boundary markers: Absent. There are no instructions to use delimiters or ignore embedded commands in the data retrieved from the WhatsApp service.\n
  • Capability inventory: Includes network transmission of messages (WHATSAPP_SEND_MESSAGE), media uploads (WHATSAPP_UPLOAD_MEDIA), and business template management (WHATSAPP_CREATE_MESSAGE_TEMPLATE).\n
  • Sanitization: No sanitization or validation of the data retrieved from external messages is described.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 28, 2026, 12:25 PM