html-parser-rule
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It fetches external content from arbitrary URLs and instructs the agent to analyze the structure.
- Ingestion points: External HTML content fetched via
curlinto/tmp/source.htmland read usingheadandfs.readFileSync. - Boundary markers: None. There are no delimiters or instructions to ignore embedded malicious prompts within the HTML.
- Capability inventory: Execution of shell commands (
curl,node,pnpm,grep), file system writes (/tmp/source.html), and project-wide script execution (pnpm run collect). - Sanitization: None. The content is processed raw by the agent and Node.js scripts.
- [COMMAND_EXECUTION] (HIGH): The skill uses
curlto fetch user-provided URLs. This could be exploited for Server-Side Request Forgery (SSRF) to access internal metadata services or local network resources. It also executespnpm run collect, which could trigger broader system effects depending on the project configuration. - [REMOTE_CODE_EXECUTION] (HIGH): Uses
node -eto execute JavaScript code that processes content from the external/tmp/source.html. While the code template is fixed, an attacker controlling the HTML could potentially exploit regex vulnerabilities (ReDoS) or influence the agent's logic generation in Step 7.
Recommendations
- AI detected serious security threats
Audit Metadata