healthcare-monitor
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection. It ingests untrusted data from various external news sites and corporate databases (Tianyancha, Qichacha, 36kr, etc.) and processes this content in an LLM-based analysis pipeline.
- Ingestion points:
scripts/scraper_free.py,scripts/funding_detector_v2.py, andscripts/quick_monitor.pyfetch raw content from the web. - Boundary markers: The prompt template in
scripts/analyzer.py(analyze_with_llm) lacks explicit delimiters or instructions to ignore embedded commands in the processed data. - Capability inventory: The skill has access to
subprocess.runfor command execution andPlaywrightfor browser operations. - Sanitization: No evidence of sanitization or filtering of external content before it is interpolated into analysis prompts.
- [COMMAND_EXECUTION]: Multiple scripts utilize
subprocess.runto interact with the host system. While currently used for benign purposes, this capability increases the potential impact of an injection attack. - Evidence:
scripts/funding_detector.pycallspass show api/firecrawlto retrieve secrets.scripts/quick_monitor.pyexecutesopenclaw web search.scripts/notifier.pyandscripts/funding_detector.pyattempt to execute a local shell scripttelegram-push.sh. - [EXTERNAL_DOWNLOADS]: The skill performs extensive automated scraping of third-party platforms.
- Evidence:
scripts/scraper_free.pyusesPlaywrightto rotate between天眼查 (Tianyancha), 企查查 (Qichacha), and 爱企查 (Aiqicha).scripts/funding_detector_v2.pyfetches data from news aggregators like 36kr and Sina Finance.
Audit Metadata