crawl4ai-seo
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/doctor.pyperforms environment diagnostics by executing a Python probe usingsubprocess.run. This is used to verify the availability of necessary runtimes and libraries likeuv,crawl4ai, andplaywrightwithin the local environment. - [EXTERNAL_DOWNLOADS]: As an SEO crawler, the skill intentionally fetches data from external sources. Scripts such as
scripts/crawl_batch.pyandscripts/seed_urls.pydownload HTML, robots.txt, and sitemap files from user-specified domains to perform their analysis. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted data from the web.
- Ingestion points: Untrusted data enters via
scripts/crawl_batch.py(site crawl) andscripts/seed_urls.py(sitemap discovery). - Boundary markers: The extracted metadata and content are saved in NDJSON format without delimiters to prevent the agent from interpreting data as instructions.
- Capability inventory: The skill has the ability to make network requests, write files, and execute shell commands for environment checks.
- Sanitization: Content is parsed using BeautifulSoup and HTMLParser, but there is no explicit sanitization to remove or neutralize potential instructions directed at the AI agent.
Audit Metadata