microlink-api
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides parameters such as
function,evaluate,scripts, andmodulesthat allow the AI agent to execute arbitrary JavaScript code within a remote headless browser context on the Microlink infrastructure. - The
functionparameter enables the execution of logic with access to the Puppeteerpageobject and various NPM packages (e.g.,@aws-sdk/client-s3,youtube-dl-exec). - The
scriptsandstylesparameters allow for the injection of inline code or absolute URLs into the target page, which could be used for content manipulation or data harvesting. - [PROMPT_INJECTION]: The skill acts as a surface for indirect prompt injection (Category 8) because it ingests and processes data from arbitrary external URLs.
- Ingestion points: Content is fetched from user-provided URLs in multiple formats including metadata, HTML, and markdown (documented in
SKILL.mdandapi-reference.md). - Boundary markers: The skill does not utilize delimiters or specific instructions to ignore embedded commands within the fetched external data.
- Capability inventory: The skill possesses capabilities for remote code execution, asset generation (screenshots/PDFs), and structured data scraping.
- Sanitization: No validation or sanitization of the fetched external content is described before the data is returned to the agent's context.
- [EXTERNAL_DOWNLOADS]: The skill utilizes the
@microlink/mqlpackage and references the@microlink/clitool. It communicates with external API endpoints atapi.microlink.ioandpro.microlink.ioto perform its functions. - [COMMAND_EXECUTION]: The documentation provides instructions for installing and using the
microlinkCLI tool, which requires the agent to have permission to execute commands in the local shell environment.
Audit Metadata