env-to-fnox
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION] (HIGH): The skill explicitly commands the agent to read the contents of
.envfiles usingcat .env. These files are known to contain highly sensitive data such as API keys, database credentials, and AWS secrets. Providing this content to the agent context constitutes a data exposure risk. - [EXTERNAL_DOWNLOADS] (MEDIUM): The workflow requires the installation of the
fnoxtool viamise.fnoxis not provided by a trusted organization (e.g., Anthropic, OpenAI, Microsoft) and is an unverified dependency in this context. - [COMMAND_EXECUTION] (MEDIUM): The skill executes multiple shell commands with side effects, including
rm .envandop item create. While consistent with the stated purpose, these commands could be abused if the agent is manipulated by malicious data within the processed files. - [DATA_EXFILTRATION] (LOW): This skill is vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: Reads external
.envfiles viacat .env. - Boundary markers: None. Content is read directly into the context without delimiters or warnings.
- Capability inventory: File deletion (
rm), tool installation (mise use), and secret creation (op item create). - Sanitization: None. The skill does not validate the content of the
.envfile before processing.
Recommendations
- AI detected serious security threats
Audit Metadata