CtrlK
BlogDocsLog inGet started
Tessl Logo

file-expenses

Help submit an expense or reimbursement on any platform. Detects the right tool (Benepass, Brex, Concur, Expensify, etc.), finds receipts, checks for duplicates, and walks through submission.

73

Quality

66%

Does it follow best practices?

Impact

No eval scenarios have been run

SecuritybySnyk

Critical

Do not install without reviewing

Optimize this skill with Tessl

npx tessl skill review --optimize ./examples/file-expenses/SKILL.md
SKILL.md
Quality
Evals
Security

Security

3 findings — 1 critical severity, 2 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.

Critical

E006: Malicious code pattern detected in skill scripts

What this means

Detected high-risk code patterns in the skill content — including its prompts, tool definitions, and resources — such as data exfiltration, backdoors, remote code execution, credential theft, system compromise, supply chain attacks, and obfuscation techniques.

Why it was flagged

Malicious code pattern detected (high risk: 0.90). The skill contains deliberate, privacy-invasive behavior (e.g., “silently run” background searches of Gmail/Slack and expense-platform histories and instructions to hide that step) that is deceptive and could be abused to access or exfiltrate sensitive user data or capture authentication flows.

Report incorrect finding
Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 0.90). The skill explicitly instructs the agent to search and ingest user-generated content from open third-party sources (e.g., "search Gmail (and Slack if available)" in Flow step 3 and "search Gmail for prior reimbursement confirmations AND check the expense platform's transaction history" in step 5), which the agent will read and use to pre-fill forms and decide whether to submit — enabling indirect prompt injection from those sources.

Medium

W009: Direct money access capability detected (payment gateways, crypto, banking)

What this means

The skill is specifically designed for direct financial operations, giving the agent the ability to move money or execute financial transactions — such as payment processing, cryptocurrency operations, banking integrations, or market order execution.

Why it was flagged

Direct money access detected (high risk: 1.00). The skill is explicitly designed for financial operations: it targets expense/reimbursement platforms by name (Benepass, Brex, Concur, Expensify, Ramp), locates receipts, fills platform forms, attaches receipts, checks balances/budgets, performs a duplicate check against transaction history, and — after getting explicit user OK — submits the expense. Submitting an expense/reimbursement is an explicit financial transaction that can trigger money movement (reimbursement). Although it may require SSO or a final confirmation handoff, the skill's primary and explicit purpose is to execute expense submissions on payment/expense platforms, so it grants direct financial execution capability.

Repository
douglasvought/wiggle-skills
Audited
Security analysis
Snyk

Is this your skill?

If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.