web-scraper
Audited by Gen Agent Trust Hub on Feb 13, 2026
The skill consists of a SKILL.md file, a requirements.txt file, and a Python script scripts/scrape.py. The analysis focused on identifying potential security threats across these components.
-
Prompt Injection: No patterns indicative of prompt injection (e.g., 'IMPORTANT: Ignore', role-play injection, developer mode activation) were found in
SKILL.mdorscripts/scrape.py. -
Data Exfiltration: The Python script makes HTTP GET requests to user-provided URLs to fetch web content and images. It does not contain any code that reads sensitive local files (like
~/.aws/credentialsor~/.ssh/id_rsa) and subsequently sends them to external, non-whitelisted domains. The network operations are solely for fetching content, not exfiltrating local data. -
Obfuscation: No obfuscation techniques (e.g., Base64 encoding, zero-width characters, homoglyphs, URL/hex/HTML encoding) were detected in any of the provided files.
-
Unverifiable Dependencies: The
requirements.txtspecifiesrequests>=2.31.0andbeautifulsoup4>=4.12.0. These are widely used, well-maintained, and trusted Python libraries. TheSKILL.mdalso links tohttps://requests.readthedocs.io/, a trusted source. Whilepip installis an external download, the dependencies themselves are considered low risk due to their trusted status. This is noted as an informational finding. -
Privilege Escalation: No commands or code patterns (e.g.,
sudo,chmod +xon system files,chmod 777, service/daemon installation) were found that attempt to acquire elevated privileges. -
Persistence Mechanisms: There are no attempts to establish persistence (e.g., modifying
.bashrc, creating cron jobs, or installing systemd services). -
Metadata Poisoning: The
SKILL.mdmetadata fields (name,description,homepage) were checked and found to be free of malicious instructions. -
Indirect Prompt Injection: The skill processes arbitrary web content from user-provided URLs. As with any tool that processes external, untrusted data, there is an inherent risk that malicious instructions embedded within the scraped content could potentially influence an AI agent if that content were subsequently fed back to an LLM. However, the skill itself does not perform this action, and this is a general risk associated with processing external data, not a direct vulnerability in the skill's code.
-
Time-Delayed / Conditional Attacks: No conditional logic or time-based triggers were found that would suggest a delayed or conditional malicious payload.
Conclusion: The skill appears to be safe and performs its stated function without exhibiting malicious behavior. The use of standard Python libraries and adherence to common web scraping practices (like respecting robots.txt by default and rate limiting) indicate a well-intentioned design.