jotform
Pass
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
bash -cto wrapcurlcommands. This is implemented as a workaround for environment variable handling in piped command sequences. - [EXTERNAL_DOWNLOADS]: The skill makes network requests to official JotForm domains (
api.jotform.com,eu-api.jotform.com,hipaa-api.jotform.com) to retrieve and manage form data. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted data from external form submissions.
- Ingestion points: Form submissions, questions, and properties retrieved via
GETrequests inSKILL.md. - Boundary markers: Absent. Data retrieved from the API is piped to
jqand then directly into the agent's context without delimiters. - Capability inventory: The skill utilizes
curlfor network operations andbash -cfor command execution, providing a surface for further actions if the agent is manipulated. - Sanitization: No explicit sanitization or filtering is performed on the data retrieved from JotForm before it is presented to the agent.
Audit Metadata