tavily-tools
Pass
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION] (LOW): Indirect prompt injection surface detected.
- Ingestion points: The
search,extract, andcrawlcommands inscripts/tavily.pyingest arbitrary data from external URLs into the agent's context. - Boundary markers: No specific delimiters or instructions (e.g., 'treat the following as untrusted data') are documented in the skill to prevent the model from obeying instructions found in scraped content.
- Capability inventory: The skill executes Python scripts via
uv runand interacts with the Tavily API. - Sanitization: No sanitization or filtering of the retrieved web content is mentioned.
- [DATA_EXFILTRATION] (LOW): The skill performs network requests to the Tavily AI API. While this is the intended purpose, these domains are not on the standard internal whitelist and involve sending query data to an external provider.
- [COMMAND_EXECUTION] (SAFE): The skill documentation provides examples of executing a local Python script (
scripts/tavily.py) usinguv run. This is a standard and expected method for executing skill logic.
Audit Metadata