skills/firecrawl/openclaw/gifgrep/Gen Agent Trust Hub

gifgrep

Warn

Audited by Gen Agent Trust Hub on Apr 18, 2026

Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The skill facilitates the installation of the 'gifgrep' binary from a third-party GitHub repository ('steipete/gifgrep') using 'brew' or 'go install'. This source is not recognized as a primary vendor or a well-known service, introducing risks associated with unverifiable external code.\n- [COMMAND_EXECUTION]: The core functionality of the skill is centered on executing the 'gifgrep' command-line tool. This tool performs network requests, manipulates files in the local filesystem (such as '~/Downloads'), and invokes system-level utilities.\n- [CREDENTIALS_UNSAFE]: The documentation specifies that 'GIPHY_API_KEY' and 'TENOR_API_KEY' environment variables are required for full functionality. This requires the agent to manage and utilize sensitive authentication tokens for external services.\n- [DATA_EXFILTRATION]: The skill performs network operations to fetch data from external GIF providers (Tenor and Giphy). These domains are not among the standard whitelisted sources for data retrieval.\n- [PROMPT_INJECTION]: The skill ingests untrusted metadata, such as GIF titles and tags, from external providers. This data is processed and presented to the agent without defined boundary markers or sanitization, creating a surface for indirect prompt injection. The agent possesses capabilities to execute binaries and perform filesystem writes, which could be exploited if malicious instructions were embedded in the retrieved content.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Apr 18, 2026, 12:42 PM