wraps-email
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill relies on the installation of
@wraps.dev/email, a package from an unverified third-party source not included in the trusted organizations list. - [COMMAND_EXECUTION] (LOW): The skill utilizes
readFileSyncto process file attachments. This creates a risk where an agent, if improperly constrained, could be instructed to read sensitive local files (such as~/.ssh/id_rsaor.envfiles) and send them as attachments via email. - [CREDENTIALS_UNSAFE] (LOW): The SDK is designed to handle AWS credentials directly. While the documentation recommends using environment variables, it also demonstrates patterns for explicit credential passing, which increases the surface area for potential credential exposure.
- [PROMPT_INJECTION] (LOW): The skill is vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points: Data enters the skill via the
html,subject, andtemplateDatafields in thesendandsendTemplatemethods. - Boundary markers: Absent. The documentation provides no guidance on using delimiters to separate instructions from user-provided data.
- Capability inventory: The skill has the capability to read local files (
readFileSync) and send data over the network via AWS SES. - Sanitization: Absent. There is no evidence of HTML sanitization or input validation for template variables, allowing potential injection of malicious payloads into the email body.
Audit Metadata