linkedin-teneo
Pass
Audited by Gen Agent Trust Hub on Apr 16, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [SAFE]: No malicious patterns such as credential harvesting, data exfiltration, or obfuscation were found within the skill's instructions or metadata.
- [COMMAND_EXECUTION]: The skill includes instructions to execute local shell commands for tool verification (
test -f ~/teneo-skill/teneo && ~/teneo-skill/teneo --version) and agent discovery (~/teneo-skill/teneo list-agents). These commands are standard for diagnostic purposes and do not involve privilege escalation or unauthorized access. - [EXTERNAL_DOWNLOADS]: The skill references official project links for the Teneo Protocol, including the developer's GitHub repositories for the SDK and CLI source code. These resources are hosted on platforms associated with the verified author (TeneoProtocolAI).
- [SAFE]: A potential surface for indirect prompt injection is noted due to the skill's primary function of processing external data from LinkedIn.
- Ingestion points: Data retrieved from LinkedIn via the Teneo CLI tool.
- Boundary markers: None explicitly mentioned in this documentation file.
- Capability inventory: Shell command execution via the local
teneobinary. - Sanitization: No sanitization methods are described in the instructional text.
Audit Metadata