telnyx-sip-ruby
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill contains a hardcoded password string within the Ruby code example for creating a new credential connection. Evidence:
password: "my123secure456password789"inSKILL.md. - [COMMAND_EXECUTION]: The installation instructions include a command to install the official Telnyx Ruby gem. Evidence:
gem install telnyxinSKILL.md. - [PROMPT_INJECTION]: The skill retrieves and processes data from external API endpoints, creating a surface for indirect prompt injection if the remote data is compromised. Ingestion points: API responses from methods such as
client.connections.listandclient.access_ip_ranges.list. Boundary markers: None present in the provided code snippets. Capability inventory: Uses the Telnyx Ruby SDK for network operations and API management. Sanitization: No explicit validation or sanitization of API response data is demonstrated in the examples.
Recommendations
- AI detected serious security threats
Audit Metadata