firecrawl
Warn
Audited by Gen Agent Trust Hub on Feb 18, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (MEDIUM): The skill requires the installation of the
firecrawl-clipackage from npm. This package and its maintainers are not included in the Trusted External Sources list. - [COMMAND_EXECUTION] (MEDIUM): The
firecrawl browsercommand allows for the execution of arbitrary scripts using the--python,--node, and--bashflags. While the documentation states these run in a 'remote sandboxed cloud environment', this still grants the agent the capability to generate and execute code based on potentially untrusted instructions. - [PROMPT_INJECTION] (LOW): The skill is a major surface for Indirect Prompt Injection (Category 8) as its primary purpose is to ingest third-party web content.
- Ingestion points:
SKILL.md(via thescrape,search,crawl, andmapcommands which fetch external web data). - Boundary markers: Present. The skill mandates writing output to the
.firecrawl/directory using the-oflag and suggests usinggreporheadto avoid reading entire malicious payloads into the agent context. - Capability inventory: Execution of
firecrawlCLI,npmfor installation, and file manipulation utilities (grep,head,wc). - Sanitization: The skill explicitly instructs the agent to quote URLs to prevent shell command injection.
Audit Metadata