Use when the user asks how to build with OpenAI products or APIs and needs up-to-date official documentation with citations, help choosing the latest model for a use case, or model upgrade and prompt-upgrade guidance; prioritize OpenAI docs MCP tools, use bundled references only as helper context, and restrict any fallback browsing to official OpenAI domains.
87
83%
Does it follow best practices?
Impact
92%
1.05xAverage score across 3 eval scenarios
Critical
Do not install without reviewing
Security
3 findings — 1 critical severity, 2 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.
Detected a prompt injection in the skill instructions. The skill contains hidden or deceptive instructions that fall outside its stated purpose and attempt to override the agent’s safety guidelines or intended behavior.
Potential prompt injection detected (high risk: 1.00). The prompt includes deceptive operational instructions—specifically to retry installing the MCP with escalated permissions and "Do not ask the user to run it yet"—which instruct the agent to perform privileged/hidden actions outside the stated documentation-purpose and thus constitute a prompt injection.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The skill explicitly fetches remote guidance at runtime—notably https://developers.openai.com/api/docs/guides/latest-model.md (and then whatever migration/prompting guide URLs it returns) and relies on the OpenAI developer-docs MCP at https://developers.openai.com/mcp—to determine model selection and prompt-upgrade instructions, so external content fetched during execution directly controls the agent's prompts and is a required dependency.
The skill prompts the agent to compromise the security or integrity of the user’s machine by modifying system-level services or configurations, such as obtaining elevated privileges, altering startup scripts, or changing system-wide settings.
Attempt to modify system services in skill instructions detected (high risk: 0.90). The skill explicitly tells the agent to run installation commands on the host and to "retry the same command with escalated permissions" (i.e., attempt privilege escalation) rather than only suggesting the user run them, which directs the agent to modify system state and seek sudo-like privileges.
590b49e
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.