skills/jeremylongshore/claude-code-plugins-plus-skills/firecrawl-advanced-troubleshooting/Gen Agent Trust Hub
firecrawl-advanced-troubleshooting
Fail
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill executes
kubectl get secret firecrawl-secrets -o yamlinSKILL.md, which exports sensitive Kubernetes secret data (including API keys and tokens) to a local file. Although the filename suggests redaction, the command itself extracts full encoded secrets. - [COMMAND_EXECUTION]: The script uses
tcpdump -i any port 443to perform packet capture. This is a high-privilege operation that records network traffic, potentially exposing sensitive metadata and connection details. - [DATA_EXFILTRATION]: The
advanced-firecrawl-debug.shscript bundles system logs, metrics, traces, and secrets into a single archive (.tar.gz). This aggregation represents a significant exposure of internal system configuration and sensitive infrastructure data. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted system data.
- Ingestion points: Reads data from
kubectl logsandjournalctloutput inSKILL.md. - Boundary markers: No delimiters or safety warnings are present to prevent the agent from obeying instructions embedded in logs.
- Capability inventory: The skill possesses high-privilege capabilities including
kubectl,curl, andtcpdumpexecution. - Sanitization: There is no evidence of content sanitization or validation of the logs before they are processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata