email-delivery
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Data Exfiltration (CRITICAL): The skill implements a direct path for reading local filesystem data and transmitting it externally via the Resend API.
- Evidence: In
templates/attachment-email-template.ts, thesendWithFileAttachmentfunction reads arbitrary file paths usingfs.readFileSync(filePath)and immediately attaches them to an email viaresend.emails.send. - Risk: An attacker can exploit this capability to exfiltrate sensitive files such as
~/.ssh/id_rsa,.env, or AWS credentials by directing the agent to 'attach' these files to an email. - Prompt Injection (HIGH): The skill is vulnerable to Indirect Prompt Injection (Category 8) due to its handling of external URLs and email content.
- Ingestion points: The
fileUrlparameter intemplates/attachment-email-template.ts(sendWithUrlAttachment function). - Boundary markers: Absent; there are no delimiters or 'ignore' instructions for the content retrieved from URLs.
- Capability inventory:
fetch(network read),fs.readFileSync(local read), andresend.emails.send(network write/email). - Sanitization: Absent; fetched URL content is converted directly to a buffer and transmitted without inspection or filtering.
- Command Execution (LOW): The skill includes shell scripts intended for execution, which increases the local attack surface.
- Evidence:
scripts/validate-attachment.shandscripts/validate-email.shuse local commands likestat,file, andgrepto process input data.
Recommendations
- AI detected serious security threats
Audit Metadata