whatsapp-automation
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Reference to an external MCP server endpoint (https://rube.app/mcp). This domain is not part of the provided trusted vendor list or recognized as a well-known service infrastructure provider.\n- [PROMPT_INJECTION]: Potential for indirect prompt injection through the processing of incoming WhatsApp messages.\n
- Ingestion points: Incoming message content received via the WhatsApp Business API and processed in the reply workflow.\n
- Boundary markers: Absent. There are no instructions to use delimiters or ignore embedded commands in the data retrieved from the WhatsApp service.\n
- Capability inventory: Includes network transmission of messages (WHATSAPP_SEND_MESSAGE), media uploads (WHATSAPP_UPLOAD_MEDIA), and business template management (WHATSAPP_CREATE_MESSAGE_TEMPLATE).\n
- Sanitization: No sanitization or validation of the data retrieved from external messages is described.
Audit Metadata