resend-cli
Pass
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: SAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill references an official installation script from resend.com. This is a recognized and standard distribution method for the Resend CLI provided by a well-known technology company.\n- [COMMAND_EXECUTION]: The scripts/resend_cli.py helper executes the resend CLI using Python's subprocess.run with a list of arguments. This approach is secure against shell injection and is the intended primary use case for managing Resend operations.\n- [DATA_EXFILTRATION]: No unauthorized data access patterns were detected. Authentication is managed using environment variables and local configuration files with restrictive permissions as per Resend's official security practices.\n- [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection via its email receiving and webhook monitoring features. It mitigates this risk by enforcing structured NDJSON output and deterministic command flags.\n
- Ingestion points: emails receiving listen and webhooks listen commands documented in references/inbound-receiving-and-threading.md.\n
- Boundary markers: Mandatory structured parsing and the RESEND_NO_UPDATE_NOTIFIER flag defined in assets/subprocess-contract.json.\n
- Capability inventory: CLI execution via subprocess.run in scripts/resend_cli.py.\n
- Sanitization: Argument list processing in subprocess.run prevents command concatenation.
Audit Metadata