// SEC
T029
v1.0
Email Fortress Audit
Review how inbox-driven workflows can be manipulated and where prompt injection or trust failures creep in.
ABOUT
About this task
We audit an email-based workflow for trust assumptions, injection risk, unsafe automation triggers, and escalation gaps. The deliverable is a safer operating model for teams using email as part of automation or agent workflows.
SPEC
Input / output spec
INPUT_REQUIRED
- Current email workflow or sample messages
- What actions email can trigger today
- Existing inbox automations
- Known incidents or concerns
OUTPUT_DELIVERED
- Inbox trust-risk audit
- Unsafe trigger findings
- Prompt-injection and spoofing recommendations
- Safer workflow design notes
PROCESS
Execution flow
01 → Share the relevant assets, links, transcripts, exports, or samples.
02 → Receive a scope-specific quote and ETA in under 5 minutes.
03 → We analyze the workflow, draft the deliverable, and rank the highest-leverage next moves.
04 → A human reviewer tightens the output and removes noise.
05 → Get a ready-to-use report or workflow spec your team can act on next.
TARGET
Who it is for
Best for teams letting email influence automations, approvals, or agent actions.
DESCRIPTION
Suggested task description
The public API only needs a plain-language description. Copy this, then replace the team context, export link, and output language as needed.
Copy this description into the task description field
Run task T029, Email Fortress Audit. Review our inbox-driven workflow for trust failures, prompt injection risk, unsafe triggers, and escalation gaps, then recommend a safer operating model. Output in English.