robius-event-action
Pass
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: LOWDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (LOW): The skill provides patterns for processing external content such as Markdown links and user text.
- Ingestion points:
MarkdownAction::LinkNavigatedinreferences/moly-action-patterns.mdandEvent::TextInputinreferences/event-handling.md. - Boundary markers: Absent.
- Capability inventory: The patterns include opening system URIs via the
robius_openlibrary. - Sanitization: No validation or sanitization logic is present in the reference code.
- [DATA_EXFILTRATION] (LOW): The 'External Link Action Pattern' in
references/moly-action-patterns.mddemonstrates how to open system URIs usingrobius_open. This capability can be abused to exfiltrate data via URL query parameters or to conduct phishing attacks if the URL is sourced from untrusted external content like a malicious Markdown link.
Audit Metadata