paywall-editor
Pass
Audited by Gen Agent Trust Hub on Apr 15, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/sw-editor.shexecutescurlandjqto interact with the Superwall API. These operations are standard for a CLI tool and are used to facilitate communication with the editor relay. - [EXTERNAL_DOWNLOADS]: The skill communicates with
https://mcp.superwall.com, which is the official endpoint for the Superwall editor relay. This is used for session management and tool invocation as intended by the skill's functionality. - [PROMPT_INJECTION]: The skill discovers available tools dynamically from the connected browser session. This ingestion of external metadata (tool names and descriptions) creates an indirect prompt injection surface. Evidence Chain: (1) Ingestion points: Tool metadata fetched from
/editor-sessions/{id}/tools. (2) Boundary markers: None explicitly used for tool descriptions. (3) Capability inventory: Network requests to vendor API and tool execution capabilities. (4) Sanitization: JSON structure is validated usingjq. - [SAFE]: The skill follows security best practices by setting restricted file permissions (
chmod 600) on its local state file containing session tokens, ensuring sensitive data is not exposed to other users on the system.
Audit Metadata