firecrawl-debug-bundle

Pass

Audited by Gen Agent Trust Hub on Mar 14, 2026

Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [DATA_EXFILTRATION]: The skill reads from potentially sensitive files including .env and logs located in ~/.npm/_logs/.
  • Evidence: usage of cat .env and grep on npm log files.
  • Context: Although the skill implements redaction logic (using sed) to mask values in the .env file and limits log collection to 'firecrawl' entries, accessing these sensitive file paths is a high-privilege operation.
  • [COMMAND_EXECUTION]: The skill uses various command-line tools to aggregate and archive diagnostic data.
  • Evidence: execution of grep, tar, curl, and npm via the Bash tool.
  • Context: These operations are contained within a local script designed to create a troubleshooting bundle for the user to review.
  • [EXTERNAL_DOWNLOADS]: The skill performs a network connectivity check by contacting an external API.
  • Evidence: curl https://api.firecrawl.com/health.
  • Context: This request targets an official health check endpoint for FireCrawl, a well-known service, and does not transmit sensitive data.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 14, 2026, 05:06 AM