scrapling
Warn
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill implements a local 'Cookie Vault' at
references/cookie-vault.md. The workflow inSKILL.mdexplicitly directs the agent to save user-provided or session-acquired cookies to this file in plaintext. This practice exposes sensitive authentication tokens to anyone with access to the skill's environment.\n- [COMMAND_EXECUTION]: The skill utilizes a dynamic code generation pattern where it reads templates from thetemplates/directory and fills them with user-provided parameters like URLs and CSS selectors. The resulting scripts are then executed viaBash(python*), which is a potential vector for code injection if inputs are not strictly validated.\n- [EXTERNAL_DOWNLOADS]: Installation and maintenance procedures involve downloading third-party Python packages viapipand browser dependencies via thescrapling installcommand. These actions fetch and install executable binaries and libraries from external repositories.\n- [DATA_EXFILTRATION]: The skill's architecture combines the ability to read sensitive local files (like the 'Cookie Vault') with the capability to perform outbound network requests via generated Python scripts. This combination presents a risk where session credentials could be exfiltrated to external domains during scraping operations.
Audit Metadata