baoyu-url-to-markdown
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill launches a local browser instance (Chrome, Edge, or Chromium) to render web pages.\n
- Evidence:
scripts/cdp.tsuseschild_process.spawnto execute browser binaries found in standard system paths or environment variables.\n- [EXTERNAL_DOWNLOADS]: The skill connects to and retrieves content from user-provided external URLs.\n - Evidence:
scripts/main.tsaccepts a URL argument andscripts/cdp.tsuses CDP to navigate the browser to that remote resource.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data from the internet.\n - Ingestion points: Web page content is ingested from arbitrary URLs passed to the
main.tsscript.\n - Boundary markers: Output is enclosed in a YAML frontmatter block in
scripts/html-to-markdown.ts, providing some structural separation.\n - Capability inventory: The skill possesses file write permissions via
fs.writeFileinscripts/main.tsand can spawn subprocesses viascripts/cdp.ts.\n - Sanitization:
scripts/html-to-markdown.tsuseslinkedomandturndownrules to remove potentially malicious elements like<script>,<style>, and<iframe>tags.
Audit Metadata