scrapingbee-automation

Warn

Audited by Snyk on Feb 17, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill automates Scrapingbee operations via the Composio/Rube toolkit and instructs the agent to discover and execute Scrapingbee tools (via RUBE_SEARCH_TOOLS / RUBE_MULTI_EXECUTE_TOOL), which by design fetch and return content from arbitrary public websites/URLs—exposing the agent to untrusted, user-generated web content that it will read as part of its workflow.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 0.90). The skill requires an active Rube MCP connection (https://rube.app/mcp) used at runtime via RUBE_SEARCH_TOOLS / RUBE_MANAGE_CONNECTIONS / RUBE_MULTI_EXECUTE_TOOL to fetch tool schemas, recommended execution plans and to execute tools remotely, which means external content from that URL can directly control agent behavior and run code.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Feb 17, 2026, 12:17 AM