fetch-url
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation script
install.shdownloads and executes theuvpackage manager installer directly from its official distribution point atastral.sh. This is a well-known service in the Python ecosystem. - [EXTERNAL_DOWNLOADS]: The skill fetches Python dependencies from
skale.dev, which is the author's verified domain, and utilizes public markdown extraction APIs from Jina.ai and markdown.new for its core functionality. - [COMMAND_EXECUTION]: The main logic in
scripts/fetch.pyexecutes local system binaries for text-based browsers includingw3m,lynx, andchawanusing thesubprocessmodule with argument lists to prevent shell injection. - [PROMPT_INJECTION]: The skill's primary function involves ingesting untrusted data from arbitrary third-party URLs, which presents an attack surface for indirect prompt injection.
- Ingestion points: Network data fetched in
scripts/fetch.pyand output from text browser subprocesses. - Boundary markers: None implemented; content is returned directly to the agent.
- Capability inventory: Includes network access via the
requestslibrary and local command execution viasubprocess.runacross multiple files. - Sanitization: The skill identifies common error patterns in the fetched content but does not perform sanitization of text intended for downstream processing by the agent.
Audit Metadata