download-swagger-file

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [EXTERNAL_DOWNLOADS] (LOW): The script uses the native fetch API to download content from an arbitrary URL provided as an argument. This introduces a Server-Side Request Forgery (SSRF) surface where the agent could be instructed to access internal network resources.
  • [COMMAND_EXECUTION] (LOW): The script writes downloaded data to a local path specified by the user. While it performs a basic check to ensure the content starts with { or [ (validating it as JSON), the ability to write to arbitrary paths could be used to overwrite non-system configuration files if the output path is not restricted.
  • [DATA_EXFILTRATION] (SAFE): No hardcoded credentials, API keys, or logic to send sensitive local data to external servers were found.
  • [PROMPT_INJECTION] (SAFE): The skill instructions in SKILL.md are purely functional and do not contain attempts to bypass safety filters or ignore previous instructions.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:24 PM