klaviyo-developer
Pass
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: SAFE
Full Analysis
- [SAFE]: The skill implements strong security controls in its utility scripts. The
_validate_webhook_urlfunction inscripts/dev_tools.pyprevents Server-Side Request Forgery (SSRF) by blocking private IP ranges, loopback addresses, and cloud metadata endpoints. Similarly,_safe_output_pathand_safe_input_filefunctions prevent path traversal attacks by ensuring file operations are confined to the current working directory. - [COMMAND_EXECUTION]: The skill includes Python scripts that interact with the Klaviyo API. These operations are limited to authenticated API calls using the official
klaviyo-apiSDK and are used for documented integration tasks like event tracking and profile management. - [EXTERNAL_DOWNLOADS]: Dependencies listed in
requirements.txt(klaviyo-api,python-dotenv) are standard, well-maintained libraries from a well-known service provider (Klaviyo). - [CREDENTIALS_UNSAFE]: No hardcoded credentials were found. The skill follows best practices by using a
.env.examplefile and instructing users to store API keys in environment variables, which are then loaded securely viapython-dotenv. - [PROMPT_INJECTION]: The instructions are focused on providing developer guidance and do not contain patterns attempting to bypass agent safety filters or override system constraints.
- [DATA_EXFILTRATION]: While the skill can export data to CSV files, these actions are user-initiated via CLI tools and include security checks to prevent unauthorized file system access. Network activity is limited to the official Klaviyo API endpoints.
Audit Metadata