skill-browser-crawl
Fail
Audited by Gen Agent Trust Hub on May 3, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The recursive crawling script
scripts/deep_crawl.pycontains a path traversal vulnerability in theget_output_pathfunction (lines 114-135). The script constructs file paths using unsanitized components of the target URL. An attacker could provide a malicious URL containing directory traversal sequences (e.g.,../) to force the script to write Markdown files into arbitrary directories on the host system, potentially overwriting existing files or placing data in sensitive locations. - [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted data from external websites, creating a surface for indirect prompt injection.
- Ingestion points: Content is fetched via
AsyncWebCrawler.arunfrom external URLs in bothscripts/basic_crawl.py(line 117) andscripts/deep_crawl.py(line 159). - Boundary markers: The scripts do not use delimiters or provide instructions to the agent to ignore embedded commands within the crawled content before processing.
- Capability inventory: The skill has the capability to write files to the local disk and perform network requests (crawling).
- Sanitization: There is no evidence of sanitization or filtering of the Markdown content retrieved from external sources before it is stored or presented to the agent.
Recommendations
- AI detected serious security threats
Audit Metadata