monday
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [Command Execution] (SAFE): The skill uses
bash -candcurlto perform API operations. While executing shell commands carries inherent risks, the examples provided demonstrate safe usage for the skill's intended purpose. - [Data Exposure & Exfiltration] (SAFE): The skill targets the official Monday.com API endpoint (
api.monday.com). Authentication is handled via theMONDAY_API_KEYenvironment variable, avoiding hardcoded secrets and following best practices for credential management. - [Indirect Prompt Injection] (SAFE): The skill manages user-provided inputs (such as board IDs and item names) by writing them to a temporary JSON file (
/tmp/monday_request.json) before transmission viacurl. - Ingestion points: User-provided strings for board IDs, item IDs, and item names.
- Boundary markers: None explicitly defined in the prompt templates.
- Capability inventory: Local
curlexecution viabash -c. - Sanitization: The pattern of writing input to a file and using the
@flag incurlprevents direct shell command injection from malicious payload content. - [Metadata Poisoning] (SAFE): Skill metadata (name, description, secrets) is accurate and reflects the code's actual functionality without deceptive instructions.
Audit Metadata