web-fetch
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION] (LOW): Risk of Server-Side Request Forgery (SSRF) through arbitrary URL fetching.\n
- Evidence: The skill utilizes
curlandfetch()to retrieve content from any URL provided as input. This can be exploited to probe internal network services or access cloud provider metadata endpoints (e.g., 169.254.169.254) that should not be exposed to the agent context.\n- [COMMAND_EXECUTION] (LOW): Potential for shell command injection via variable interpolation.\n - Evidence: Bash snippets in
SKILL.mdinterpolate the user-controlledURLvariable directly into commands, such ascurl -sIL "$URL". This pattern relies on the agent to correctly escape the input to prevent an attacker from executing arbitrary commands using shell metacharacters.\n- [PROMPT_INJECTION] (LOW): Vulnerability to Indirect Prompt Injection (Category 8).\n - Ingestion points: External web content fetched via
curlinSKILL.mdandfetch()infetch.ts.\n - Boundary markers: Absent. The skill does not define clear boundaries or provide explicit instructions for the agent to treat the fetched content as untrusted data rather than instructions.\n
- Capability inventory: The skill enables the agent to fetch and read arbitrary external data, which is then incorporated into the conversation context and could contain malicious instructions influencing subsequent agent actions.\n
- Sanitization: While the
fetch.tsscript cleans up the HTML by removingscriptandstyletags, it does not sanitize the resulting markdown text for adversarial natural language instructions designed to bypass agent constraints.
Audit Metadata