resend-cli

Pass

Audited by Gen Agent Trust Hub on Mar 16, 2026

Risk Level: SAFE
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill references an official installation script from resend.com. This is a recognized and standard distribution method for the Resend CLI provided by a well-known technology company.\n- [COMMAND_EXECUTION]: The scripts/resend_cli.py helper executes the resend CLI using Python's subprocess.run with a list of arguments. This approach is secure against shell injection and is the intended primary use case for managing Resend operations.\n- [DATA_EXFILTRATION]: No unauthorized data access patterns were detected. Authentication is managed using environment variables and local configuration files with restrictive permissions as per Resend's official security practices.\n- [PROMPT_INJECTION]: The skill possesses a surface for indirect prompt injection via its email receiving and webhook monitoring features. It mitigates this risk by enforcing structured NDJSON output and deterministic command flags.\n
  • Ingestion points: emails receiving listen and webhooks listen commands documented in references/inbound-receiving-and-threading.md.\n
  • Boundary markers: Mandatory structured parsing and the RESEND_NO_UPDATE_NOTIFIER flag defined in assets/subprocess-contract.json.\n
  • Capability inventory: CLI execution via subprocess.run in scripts/resend_cli.py.\n
  • Sanitization: Argument list processing in subprocess.run prevents command concatenation.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 16, 2026, 12:48 PM