download-swagger-file
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The script uses the native
fetchAPI to download content from an arbitrary URL provided as an argument. This introduces a Server-Side Request Forgery (SSRF) surface where the agent could be instructed to access internal network resources. - [COMMAND_EXECUTION] (LOW): The script writes downloaded data to a local path specified by the user. While it performs a basic check to ensure the content starts with
{or[(validating it as JSON), the ability to write to arbitrary paths could be used to overwrite non-system configuration files if the output path is not restricted. - [DATA_EXFILTRATION] (SAFE): No hardcoded credentials, API keys, or logic to send sensitive local data to external servers were found.
- [PROMPT_INJECTION] (SAFE): The skill instructions in
SKILL.mdare purely functional and do not contain attempts to bypass safety filters or ignore previous instructions.
Audit Metadata