scrapingbee-automation
Warn
Audited by Snyk on Feb 17, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill automates Scrapingbee operations via the Composio/Rube toolkit and instructs the agent to discover and execute Scrapingbee tools (via RUBE_SEARCH_TOOLS / RUBE_MULTI_EXECUTE_TOOL), which by design fetch and return content from arbitrary public websites/URLs—exposing the agent to untrusted, user-generated web content that it will read as part of its workflow.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill requires an active Rube MCP connection (https://rube.app/mcp) used at runtime via RUBE_SEARCH_TOOLS / RUBE_MANAGE_CONNECTIONS / RUBE_MULTI_EXECUTE_TOOL to fetch tool schemas, recommended execution plans and to execute tools remotely, which means external content from that URL can directly control agent behavior and run code.
Audit Metadata