This instructional skill describes using `curl` and `jq
Claims to do
Notion API Skill: This skill enables interaction with Notion workspaces through the Notion REST API. Use `curl` and `jq` for direct REST calls, or write ad-hoc scripts as appropriate for the task.
Actually does
This skill provides detailed instructions and `curl` examples for interacting with the Notion REST API. It outlines how to use `curl` and `jq` to perform operations like searching, creating, retrieving, updating, and deleting Notion pages, blocks, databases, data sources, users, and comments. It requires a `NOTION_API_TOKEN` (from environment or user input) and contacts `https://api.notion.com/v1/*` endpoints.
The skill explicitly instructs the agent to use `curl` and `jq` for direct REST calls, implying shell command execution capability. This allows an attacker to potentially execute arbitrary commands if prompt input is not properly sanitized.
Use `curl` and `jq` for direct REST calls, or write ad-hoc scripts as appropriate for the task.
The Notion API token (`$NOTION_API_TOKEN`) is directly used in `curl` commands. If these commands can be manipulated via prompt injection, the token could be exposed or exfiltrated to an attacker-controlled endpoint.
-H "Authorization: Bearer $NOTION_API_TOKEN"
The skill's reliance on `curl` for making HTTP requests presents a risk for Server-Side Request Forgery (SSRF) or data exfiltration if an attacker can manipulate the target URL or request body through prompt injection.
curl -s -X POST "https://api.notion.com/v1/search"
The skill's stated purpose implies it 'enables interaction' and 'uses `curl` and `jq`' for direct REST calls. However, the content is purely instructional, providing examples of `curl` commands. The skill itself does not execute any commands or interact with the Notion API; it only describes how a user or another system *could* do so.
The skill content consists entirely of markdown documentation, explanations, and `curl` command examples. There are no executable scripts or functions within the skill that would directly run `curl` or `jq`.
The skill relies on the agent to ask for user confirmation before executing destructive operations. This is a guideline that could be bypassed by a malicious prompt, leading to unauthorized data modification or deletion.
IMPORTANT: Before executing any operation that modifies or deletes data, ask the user for confirmation.
The skill instructs the agent to request the API key from the user if it's not available. This mechanism could be exploited by a malicious prompt to harvest credentials, especially when combined with command execution capabilities.
If neither is available, use AskUserQuestion (or equivalent) to request the API key from the user
[](https://mondoo.com/ai-agent-security/skills/github/intellectronica/agent-skills/notion-api)<a href="https://mondoo.com/ai-agent-security/skills/github/intellectronica/agent-skills/notion-api"><img src="https://mondoo.com/ai-agent-security/api/badge/github/intellectronica/agent-skills/notion-api.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/intellectronica/agent-skills/notion-api.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.