deep-research-main
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) due to its core design of fetching and synthesizing external web data.
- Ingestion points: External data enters the agent context during Phase 3, where it is fetched from arbitrary URLs using tools like
mcp_webfetchandcurl(referenced intool_strategy.md). - Boundary markers: Boundary markers are absent. The
SYNTHESIS_PROMPTandverificationprompt inpipelines.pyinterpolate external findings and claims directly into the instructions without delimiters or warnings to ignore embedded content. - Capability inventory: Across its scripts, the skill utilizes subprocess calls (via shell for
curl), file-writing (Write), file-reading (Read), and background task execution (Task). - Sanitization: No evidence of sanitization, escaping, or validation of the external content was found before it is interpolated into prompts.
- [COMMAND_EXECUTION]: The skill utilizes shell commands (specifically
curland Python scripts likeorchestrator.py) to manage research sessions and fetch content. Thetool_strategy.mdfile provides templates for usingcurlwith spoofed User-Agents and other headers to bypass access controls on third-party websites. While intended for legitimate research functionality, these shell-based capabilities represent an execution surface that could be targeted by malicious inputs.
Audit Metadata