article-extractor
Pass
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and processes content from arbitrary external URLs.
- Ingestion points: Content is fetched from user-provided URLs using
curl,reader, ortrafilaturaas described inSKILL.md. - Boundary markers: Absent. The extracted content is displayed as a preview and saved to a file without clear delimiters or instructions to ignore embedded commands.
- Capability inventory: The skill utilizes
Bashfor file operations andWritefor saving content (as defined inSKILL.md). - Sanitization: While filenames are sanitized for filesystem compatibility, the extracted article text itself is not sanitized or filtered for malicious instructions.
- [EXTERNAL_DOWNLOADS]: The skill suggests installing external dependencies to achieve its functionality.
- Findings: Suggests installing
reader-cliand@mozilla/readability-clivia npm, andtrafilaturavia pip. While Mozilla and Trafilatura are well-known, third-party packages likereader-clishould be manually verified before installation. - [COMMAND_EXECUTION]: The skill executes shell commands and Python scripts via Bash to handle data.
- Findings: Uses
python3 -cto run embedded scripts for HTML and JSON parsing. It employs variables like$ARTICLE_URLwithin shell commands. While it uses double quotes to mitigate simple shell injection, safety depends on the agent providing a valid URL.
Audit Metadata