xurl
Fail
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: Installation instructions include a command that downloads a shell script from a remote URL and pipes it directly into the bash interpreter (
curl -fsSL https://raw.githubusercontent.com/xdevplatform/xurl/main/install.sh | bash). This executes remote code from an untrusted repository without prior verification or checksum validation. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
xurlCLI tool from several external, unverified sources including a third-party Homebrew tap (xdevplatform/tap/xurl), an npm package (@xdevplatform/xurl), and a Go package (github.com/xdevplatform/xurl). - [COMMAND_EXECUTION]: The skill relies on the execution of the
xurlbinary. This allows the agent to perform actions like posting, replying, and accessing raw API endpoints, which could be manipulated to perform unintended actions if the agent is compromised. - [DATA_EXFILTRATION]: The skill references and interacts with sensitive credentials stored in
~/.xurl. Although the documentation instructs the agent not to expose this file, the capability to read it exists, creating a risk of credential exposure. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it fetches and processes untrusted data from the X platform (tweets, DMs, search results).
- Ingestion points: Untrusted content enters the system through
xurl read,xurl search,xurl timeline,xurl mentions, andxurl dmsinSKILL.md. - Boundary markers: No specific delimiters are defined in
SKILL.mdto separate untrusted platform content from the agent's instructions. - Capability inventory: The skill can perform state-changing actions such as posting, following, and raw API calls in
SKILL.md. - Sanitization: There is no evidence of sanitization or escaping of the retrieved content before it is processed by the agent in
SKILL.md.
Recommendations
- HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/xdevplatform/xurl/main/install.sh - DO NOT USE without thorough review
- AI detected serious security threats
Audit Metadata