perfex-email
Warn
Audited by Gen Agent Trust Hub on Apr 22, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
_render_email_templatefunction performs dynamic file inclusion usinginclude(__DIR__ . '/../views/emails/' . $template . '.php'). This pattern is susceptible to Local File Inclusion (LFI) if the$templateparameter is influenced by untrusted data. - [COMMAND_EXECUTION]: The implementation uses
extract($data), which dynamically creates variables from array keys. This can lead to variable collision or overwriting internal state if the data source is not authenticated or validated. - [DATA_EXFILTRATION]: The instructions advise on using
mail_debugandprint_debugger(), which expose raw SMTP communications. The skill correctly identifies that this can leak sensitive data (PII or tokens) if left enabled in production environments. - [PROMPT_INJECTION]: The skill implements a surface for indirect prompt injection via the email template rendering engine.
- Ingestion points: The
$dataarray in_render_email_template(SKILL.md). - Boundary markers: Absent.
- Capability inventory: Database inserts via
enqueue_email_retryand dynamic file inclusion viainclude(SKILL.md). - Sanitization: Uses
htmlspecialchars()for variable rendering, but lacks validation for array keys or file paths.
Audit Metadata