web-fetch
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [Data Exposure & Exfiltration] (MEDIUM): Potential for Local File Read (LFR) and Server-Side Request Forgery (SSRF).
- Evidence: The
web_fetch.pyscript usesurllib.request.urlopen(request)directly with a user-provided URL. - Risk: Python's
urllibsupports multiple protocols beyond HTTP/HTTPS. An attacker could passfile:///etc/passwdorfile:///home/user/.ssh/id_rsato read sensitive local files, or use internal IP addresses to probe the local network. - [Indirect Prompt Injection] (LOW): The skill ingests untrusted data from external web sources.
- Ingestion points:
web_fetch.py(thecontentvariable populated byresponse.read()). - Boundary markers: Absent. The response content is returned as a raw string or JSON object without delimiters or warnings for the LLM.
- Capability inventory: The skill allows network reads/writes (via HTTP methods) and potentially local file reads via the URL flaw.
- Sanitization: No sanitization or filtering is performed on the fetched content before returning it to the agent.
- [Data Exfiltration] (LOW): The skill allows the agent to send data to arbitrary external URLs via POST/PUT methods and custom headers.
- Evidence: The
--methodand--dataarguments inskill.jsonandweb_fetch.pyenable sending arbitrary payloads to non-whitelisted domains.
Audit Metadata