phone-specs-scraper
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It fetches and processes data from external, third-party sources (GSM Arena, PhoneDB, SearXNG, etc.) and presents it to the agent. An attacker could potentially inject malicious instructions into the content of these pages to influence the agent's logic when it parses the results.
- Ingestion points: The functions
scrape_gsmarena_specs,search_phone_specs, andscrape_comparison_siteingest untrusted data from the web. - Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the prompt template.
- Capability inventory: The skill utilizes shell commands (
curl,grep,head) and network operations via JavaScriptfetch. - Sanitization: No sanitization or filtering of the scraped HTML or text is performed before it is returned to the agent context.
- [EXTERNAL_DOWNLOADS]: The skill performs network requests to several non-whitelisted external domains, including
gsmarena.com,phonedb.net,mkmobilearena.com,devicebeast.com,comparigon.com,specsbattle.com, and various public SearXNG instances likesearx.party. These are used for legitimate scraping functionality but represent an outbound communication channel. - [COMMAND_EXECUTION]: The skill uses shell-based tools such as
curl,grep,sed, andheadto retrieve and parse data. While these are used for the primary purpose of the skill, they provide a capability for command execution that relies on the agent correctly handling and quoting input variables (likePHONE_URLorQUERY) when invoking the shell.
Audit Metadata