firecrawl-debug-bundle
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEDATA_EXFILTRATIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: The skill reads from potentially sensitive files including .env and logs located in ~/.npm/_logs/.
- Evidence: usage of
cat .envandgrepon npm log files. - Context: Although the skill implements redaction logic (using
sed) to mask values in the .env file and limits log collection to 'firecrawl' entries, accessing these sensitive file paths is a high-privilege operation. - [COMMAND_EXECUTION]: The skill uses various command-line tools to aggregate and archive diagnostic data.
- Evidence: execution of
grep,tar,curl, andnpmvia the Bash tool. - Context: These operations are contained within a local script designed to create a troubleshooting bundle for the user to review.
- [EXTERNAL_DOWNLOADS]: The skill performs a network connectivity check by contacting an external API.
- Evidence:
curl https://api.firecrawl.com/health. - Context: This request targets an official health check endpoint for FireCrawl, a well-known service, and does not transmit sensitive data.
Audit Metadata