skills/firecrawl/openclaw/xurl/Gen Agent Trust Hub

xurl

Fail

Audited by Gen Agent Trust Hub on Apr 18, 2026

Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The skill instructs users to install the tool by piping a remote shell script from an unverified source directly into bash: curl -fsSL https://raw.githubusercontent.com/xdevplatform/xurl/main/install.sh | bash. This pattern allows the remote script author to execute arbitrary code on the local machine without user review.\n- [EXTERNAL_DOWNLOADS]: The skill relies on fetching software and configuration from several external third-party sources, including the xdevplatform GitHub repository and the npm package registry.\n- [COMMAND_EXECUTION]: The skill's primary function is to execute shell commands and a third-party CLI utility to interact with external APIs and local files.\n- [DATA_EXFILTRATION]: The xurl tool stores and manages sensitive authentication tokens in the ~/.xurl file. While the skill includes instructions to the agent to avoid reading this file, the installation of a third-party tool via an unsafe method creates a high risk that these credentials could be harvested or the tool could be modified to exfiltrate data to unauthorized endpoints.
Recommendations
  • HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/xdevplatform/xurl/main/install.sh - DO NOT USE without thorough review
  • AI detected serious security threats
Audit Metadata
Risk Level
CRITICAL
Analyzed
Apr 18, 2026, 12:42 PM