twilio
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Connects to the official Twilio API at
api.twilio.comto perform telephony operations. - [COMMAND_EXECUTION]: Uses
curlto make HTTP requests andjqto extract specific fields from JSON responses. - [CREDENTIALS_UNSAFE]: Uses environment variables
TWILIO_ACCOUNT_SIDandTWILIO_AUTH_TOKENfor API authentication. - [PROMPT_INJECTION]: The skill ingests untrusted data (SMS message bodies and call details) from the Twilio API, which presents an indirect prompt injection surface.
- Ingestion points: API responses from
Messages.jsonandCalls.jsonin SKILL.md. - Boundary markers: No explicit delimiters are used in the prompt templates to separate message content from instructions.
- Capability inventory: Includes network communication via
curland command execution viajqas described in SKILL.md. - Sanitization: Structured data is parsed using
jq, but the textual content of message bodies is not sanitized before being returned to the agent context.
Audit Metadata