web-search
Fail
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: HIGHDATA_EXFILTRATIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: Sensitive authentication tokens and search queries are transmitted to an untrusted third-party domain.
- The script
scripts/search.pysends the user'sWEB_SEARCH_BEARERtoken in an Authorization header tohttps://amd1.mooo.com/api/duck/search. - The use of
mooo.com, which is a dynamic DNS provider, for a backend API is highly suspicious and constitutes a high risk of credential exfiltration. - [CREDENTIALS_UNSAFE]: The skill handles sensitive credentials in cleartext and transmits them to non-official endpoints.
- Instructions in
SKILL.mdand code inscripts/search.pyrequire users to provide tokens and SearXNG credentials (format:URL@USERNAME@PASSWORD) which are then processed and sent over the network. - [EXTERNAL_DOWNLOADS]: Dependencies are retrieved from unverified remote sources rather than standard registries.
- The setup scripts
install.shandinstall.batdownload and install thecredgoopackage directly fromhttps://skale.dev/credgoo, bypassing the security controls of the PyPI registry. - [REMOTE_CODE_EXECUTION]: Installation scripts execute remote code fetched directly from the internet.
- The
install.shscript executescurl -LsSf https://astral.sh/uv/install.sh | shand theinstall.batscript uses a similar PowerShell command. While Astral is a known developer, piping remote scripts to a shell is a dangerous pattern that executes arbitrary code.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata