apply-job
Fail
Audited by Gen Agent Trust Hub on Mar 8, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill uses explicit override instructions ('AUTO-PROCEED Mode', 'JUST DO IT', 'DO NOT ask for confirmation') to force the agent to bypass standard interactive safety checks. This significantly increases the risk that malicious instructions encountered during the automated workflow will be executed without the user's knowledge.
- [REMOTE_CODE_EXECUTION]: The skill contains a dangerous dynamic execution pattern in
WORKFLOWS.mdandSKILL.md. It instructs the agent to fetch job descriptions from external URLs and use that untrusted content to modify a Python script (create_resume.py), which is then executed locally via theBashtool. This is a primary vector for Indirect Prompt Injection leading to local code execution. - Ingestion points: Job descriptions are fetched from arbitrary external URLs using
WebFetchand Playwright. - Boundary markers: No boundary markers or delimiters are used; the agent is instructed to directly reword and insert external content into Python script logic.
- Capability inventory: The agent has access to
Bash,Write, andEdittools to generate and run local scripts, as well as Playwright tools to navigate the web. - Sanitization: No sanitization or validation of the external content is performed before it is interpolated into the executable script.
- [EXTERNAL_DOWNLOADS]: The
install.shscript andSETUP.mdrecommend acurl | bashinstallation pattern from a remote repository. While this repository belongs to the skill author, executing remote scripts directly into the shell is a high-risk pattern that can be used to deliver malicious payloads. - [COMMAND_EXECUTION]: The skill relies on the
Bashtool to perform sensitive local actions, including the execution of dynamically created Python files and the management of files in the user's home directory (~/job-applier-agent). - [DATA_EXFILTRATION]: The skill manages highly sensitive PII in
profile.json(name, email, phone, location, work history). Due to the automated outreach capabilities and the lack of human-in-the-loop (via AUTO-PROCEED), a malicious job posting could exploit the agent's browse/search tools to exfiltrate this personal data to an external server.
Recommendations
- AI detected serious security threats
Audit Metadata