apify-actorization
Pass
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: In
references/cli-actorization.md, a Dockerfile example includes the commandcurl ... | shto install theubiutility from thehouseabsolute/ubirepository. This piped remote execution pattern is a security risk as it bypasses integrity checks, a risk explicitly noted in the skill's ownSKILL.mdfile.- [DATA_EXFILTRATION]: The skill provides instructions on handlingAPIFY_TOKENcredentials. It correctly advises against passing tokens as command-line arguments or embedding them in source code, recommending environment variables or interactive login instead.- [EXTERNAL_DOWNLOADS]: The skill references various external resources, including theapify-cli(via npm), the Apify SDK, and official Apify GitHub repositories. These are legitimate resources for the vendor.- [PROMPT_INJECTION]: While the skill doesn't contain malicious injections, it acknowledges the risk of indirect prompt injection from crawled web content. It provides mandatory security guidelines for sanitizing and validating external data. Mandatory Evidence Chain: (1) Ingestion points:Actor.getInput()and web crawlers; (2) Boundary markers: Present as instructions inSKILL.md; (3) Capability inventory: Subprocess execution in shell wrappers and SDK network operations; (4) Sanitization: Explicitly recommended in the Security section.
Audit Metadata