skills/wyattowalsh/agents/email-whiz/Gen Agent Trust Hub

email-whiz

Warn

Audited by Gen Agent Trust Hub on Apr 30, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its processing of untrusted data from emails via tools like gmail_read_email. Evidence: 1. Ingestion points: untrusted email content retrieved in SKILL.md and triage-framework.md. 2. Boundary markers: Security gate keywords are defined in triage-framework.md, but these serve as content filters rather than strict isolation. 3. Capability inventory: The agent has high-privilege capabilities including gmail_send_email and file write operations. 4. Sanitization: memory.py performs basic truncation but lacks comprehensive instruction-data separation.
  • [COMMAND_EXECUTION]: The skill utilizes dynamic context injection in SKILL.md (e.g., !uv run python scripts/memory.py) to execute local scripts at load time. These commands incorporate parameters influenced by user-supplied arguments, creating a potential vector for command injection if the execution environment lacks sufficient sanitization for interpolated variables.
  • [DATA_EXFILTRATION]: The skill possesses the combination of read access to sensitive email data and the ability to send emails externally (gmail_send_email). While this functionality is central to its purpose as a copilot, the risk of data exfiltration exists if the agent is manipulated via prompt injection to send sensitive contents to an external address.
  • [SAFE]: The skill demonstrates security best practices by implementing a mandatory 'Security Gate' to protect 2FA and password reset emails, and by strictly requiring user confirmation for destructive operations like label deletion or archiving.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 30, 2026, 11:13 PM