anti-scraping
Warn
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill patterns utilize
child_process.execSyncto run Node.js scripts with external input. In the provided examples, variables such as${url}and${outputFile}are interpolated directly into shell command strings. This practice is highly susceptible to command injection if the inputs contain shell metacharacters.\n- [PROMPT_INJECTION]: The skill creates a vulnerability surface for indirect prompt injection by ingesting untrusted data from external websites.\n - Ingestion points: Data is fetched from arbitrary URLs and saved to
/tmp/output.htmlas defined in the 'Basic Usage Pattern'.\n - Boundary markers: The instructions do not define boundary markers or clear separations to distinguish external content from agent instructions.\n
- Capability inventory: The skill uses
execSyncfor script execution and file system access for reading/writing HTML results.\n - Sanitization: There is no mention of sanitization, validation, or escaping of the scraped HTML content before it is processed by the agent.
Audit Metadata