Utilities
Fail
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The documentation in
Parser/README.mdincludes an example command referencinghttps://url3.com, which has been identified as a malicious domain by automated security scanners. Although used as a placeholder in the examples, its presence is a security risk. - [REMOTE_CODE_EXECUTION]: The Browser skill includes a
playwright-cli evalcommand that allows for the execution of arbitrary JavaScript within a browser session. This is a high-risk capability that could lead to code execution if the input is derived from untrusted or malicious sources. - [COMMAND_EXECUTION]: The skill frequently executes powerful system commands for file manipulation (
cp,mv,rm,unzip) and infrastructure management (wrangler deploy). These commands are necessary for the skill's utility functions but possess significant power over the host system. - [PROMPT_INJECTION]: The
ParserandPAIUpgradecomponents process untrusted data from external sources, including URLs, PDFs, and YouTube transcripts. This content is used by AI agents to populate structured data schemas and suggest modifications to core system instructions through theAlgorithmUpgradeworkflow, creating a significant surface for indirect prompt injection attacks where an attacker could influence system behavior. - [DATA_EXFILTRATION]: The skill's ability to fetch and extract content from arbitrary URLs via the
ParserandBrowsercomponents could be exploited to access and retrieve sensitive information from internal or local network resources if the agent is manipulated into doing so.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata