activity-push
Fail
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: HIGHDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [DATA_EXFILTRATION]: The
scripts/render_activity_image.pyscript contains aload_imagefunction that supports reading files from the local filesystem via thefile://protocol or direct paths. Because the input to this script (activity-structured-geo.json) is generated by an LLM that extracts data from untrusted external articles, an attacker could craft an article that tricks the model into extracting a path to a sensitive local file. This path would then be read by the image renderer, potentially exposing sensitive information. Additionally, thefetch_recent_feeds.shscript usescurlto fetch from a user-providedMP_API_HOST, which could be exploited to read local files via thefile://protocol if the host variable is manipulated.\n- [PROMPT_INJECTION]: The skill processes untrusted content from public articles to identify activities and extract structured information. It lacks any boundary markers or instructions to the model to ignore or escape instructions embedded within those articles. This makes the skill vulnerable to indirect prompt injection. Ingestion point:raw.jsonviafetch_recent_feeds.sh. Capability inventory: Network access viacurlandurllib.request, and local file access in the rendering script. Boundary markers: Absent. Sanitization: Absent.\n- [CREDENTIALS_UNSAFE]: TheSKILL.mdfile contains a hardcoded hex string (2449ebfdd2b2a1f20d88f797e3627d8fc6) for theWE_COM_WEBHOOK_KEYSenvironment variable. While presented as an example, this string is not a generic placeholder and represents a realistic credential format.\n- [COMMAND_EXECUTION]: The skill executes bash and Python scripts using absolute paths tied to a specific developer's environment (e.g.,/Users/yujian/...). This can lead to execution failures or unexpected side effects if these paths point to different resources on another machine.
Recommendations
- AI detected serious security threats
Audit Metadata