actualbudget-api
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Data Exposure & Exfiltration] (HIGH): The skill's
initfunction requires a plaintext password for synchronization with the Actual Budget server. This poses a significant risk of credential exposure if the agent logs the configuration or stores it insecurely. Additionally, the skill provides full access to sensitive financial information, including account balances and complete transaction histories. - [Indirect Prompt Injection] (HIGH): The skill presents a high-risk attack surface for indirect injection. Ingestion points: Untrusted data enters the context through
importTransactions,addTransactions, andrunBankSync. Boundary markers: Absent; there are no delimiters or specific instructions provided to the agent to treat transaction fields like 'notes' or 'payee_name' as untrusted. Capability inventory: The skill allows for high-impact financial modifications, includingdeleteAccount,closeAccount,setBudgetAmount, anddeleteTransaction. Sanitization: Absent; the API documentation does not specify any sanitization or validation for ingested string data. - [Unverifiable Dependencies & Remote Code Execution] (LOW): The skill requires the installation of the
@actual-app/apipackage from the npm registry. While this is a known library for the service, it remains an external dependency that should be verified for integrity to prevent supply chain attacks.
Recommendations
- AI detected serious security threats
Audit Metadata