firecrawl-interact
Pass
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes the
firecrawlandnpx firecrawlcommand-line tools to perform browser interactions. This involves executing shell commands to automate web tasks based on natural language prompts or provided code snippets. - [INDIRECT_PROMPT_INJECTION]: The skill processes input via the
--promptand--codearguments, which may contain content derived from scraped webpages. This creates a surface for indirect prompt injection where malicious content on a site could attempt to influence the agent's browser actions. - Ingestion points: Data passed to the
--promptand--codeflags in thefirecrawl interactcommand, potentially sourced from prior scrapes. - Boundary markers: None identified; the skill relies on the underlying tool's handling of the input.
- Capability inventory: Execution of browser actions (click, fill, navigate) and arbitrary script execution (Bash, Python, Node.js) within the browser session via the
firecrawltool. - Sanitization: No specific sanitization or validation of the input text or code is defined within the skill instructions.
Audit Metadata