telnyx-twilio-migration
Warn
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill orchestrates the migration process by executing a variety of shell scripts included in its scripts directory, including tools for discovery, state management, and validation.
- [COMMAND_EXECUTION]: The instructions mandate a high degree of autonomy, requiring the agent to perform source code transformations and Git repository commits without per-step user confirmation during the core migration phases.
- [COMMAND_EXECUTION]: The testing utility scripts/test-migration/webhook-receiver.py utilizes the subprocess.Popen method for shell command execution.
- [EXTERNAL_DOWNLOADS]: Automatically installs software libraries from public package registries (pip and npm) and communicates with official vendor API endpoints for account validation.
- [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for indirect prompt injection. Ingestion points: Untrusted project source files read during migration transformations. Boundary markers: Absent; the agent is not instructed to use delimiters or ignore instructions found within user files. Capability inventory: Writing to the file system, executing local shell scripts, and performing Git operations. Sanitization: Absent; project content is processed without validation logic.
Audit Metadata