telnyx-sip-ruby

Fail

Audited by Gen Agent Trust Hub on Mar 12, 2026

Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill contains a hardcoded password string within the Ruby code example for creating a new credential connection. Evidence: password: "my123secure456password789" in SKILL.md.
  • [COMMAND_EXECUTION]: The installation instructions include a command to install the official Telnyx Ruby gem. Evidence: gem install telnyx in SKILL.md.
  • [PROMPT_INJECTION]: The skill retrieves and processes data from external API endpoints, creating a surface for indirect prompt injection if the remote data is compromised. Ingestion points: API responses from methods such as client.connections.list and client.access_ip_ranges.list. Boundary markers: None present in the provided code snippets. Capability inventory: Uses the Telnyx Ruby SDK for network operations and API management. Sanitization: No explicit validation or sanitization of API response data is demonstrated in the examples.
Recommendations
  • AI detected serious security threats
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 12, 2026, 02:40 AM