searxng-search
Fail
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The installation scripts (
install.sh,install.bat) download and execute theuvpackage manager installer fromastral.shusing piped shell commands (curl | shandpowershell | iex). This originates from a well-known technology provider.\n- [EXTERNAL_DOWNLOADS]: The skill fetches thecredgoodependency configuration from the vendor's infrastructure atskale.devduring the installation process.\n- [COMMAND_EXECUTION]: On Windows, the setup script usespowershell -ExecutionPolicy ByPassto enable the installation of theuvtool in the local environment.\n- [PROMPT_INJECTION]: The skill processes untrusted external data from search results, which is a surface for indirect prompt injection.\n - Ingestion points: Results from SearXNG (titles and snippets) in
scripts/search.pyare printed to the terminal.\n - Boundary markers: Absent; search content is displayed without specific delimiters or instructions for the agent to ignore embedded commands.\n
- Capability inventory: The skill has the ability to make network requests and access stored credentials through the vendor-provided
credgooutility.\n - Sanitization: Content is not sanitized or filtered before it is presented to the agent.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata