gmail
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is vulnerable to Indirect Prompt Injection from processed email data.
- Ingestion points: Untrusted data enters the agent context through
scripts/read_message.py(email body) andscripts/list_messages.py(snippets). - Boundary markers: Absent. There are no instructions in
SKILL.mdor the scripts to wrap external content in delimiters or to ignore instructions embedded within the emails. - Capability inventory: The skill possesses significant capabilities including sending emails and creating drafts (
scripts/send_message.py), and modifying, trashing, or archiving messages (scripts/manage_labels.py). Additionally,scripts/read_message.pycan write files to the local disk. - Sanitization: Absent. The skill does not sanitize email content or attachment filenames. The use of
att['filename']inread_message.pyto construct a local file path (save_path / att['filename']) presents a high-severity path traversal risk if an email contains a malicious filename. - CREDENTIALS_UNSAFE (MEDIUM): The skill handles sensitive OAuth credentials.
scripts/setup_auth.pystores refresh tokens in theaccounts/directory as JSON files. While necessary for persistent Gmail access, these files represent a local credential exposure risk.
Recommendations
- AI detected serious security threats
Audit Metadata