workos-pipes
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- PROMPT_INJECTION (HIGH): The skill mandates fetching external documentation and explicitly states it is the 'source of truth' that overrides the skill's own instructions. This creates a high-risk ingestion surface for indirect prompt injection.\n
- Ingestion points:
https://workos.com/docs/pipes/providersandhttps://workos.com/docs/pipes/index.\n - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands in the fetched data.\n
- Capability inventory: The skill has access to environment variables and can execute shell commands via
env,echo, andnode -e.\n - Sanitization: Absent. Fetched content is not filtered before being adopted as the 'source of truth'.\n- CREDENTIALS_UNSAFE (HIGH): The verification checklist in
SKILL.mdincludes commands (env | grep WORKOS_API_KEYandecho $WORKOS_API_KEY) that print sensitive secret keys (prefixed withsk_) to the terminal. This practice exposes production secrets in shell history and logs.\n- COMMAND_EXECUTION (MEDIUM): The skill usesnode -eto execute a block of JavaScript code for SDK verification. While intended for a health check, executing dynamic strings in the shell increases the attack surface for potential code injection.\n- EXTERNAL_DOWNLOADS (LOW): The skill downloads content fromworkos.com. Per [TRUST-SCOPE-RULE], because theworkosorganization is a trusted source, the download finding itself is downgraded to LOW/INFO, even though the logic influence remains high.
Recommendations
- AI detected serious security threats
Audit Metadata