x-tweet-fetcher
Pass
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
fetch_direct.pyscript utilizessubprocess.run()to invoke the main scraping tool. It correctly passes arguments as a list rather than a single string, which prevents shell injection vulnerabilities when handling the user-provided URL. - [EXTERNAL_DOWNLOADS]: The skill relies on the Playwright automation library, which typically downloads browser binaries (e.g., Chromium) to the system. This is standard behavior for the tool's primary purpose.
- [PROMPT_INJECTION]: The skill provides a surface for indirect prompt injection because it fetches and processes arbitrary text from X (Twitter). If a tweet contains malicious instructions, the agent may inadvertently follow them when analyzing the fetched content.
- Ingestion points: Untrusted tweet content is retrieved from X.com in
x_tweet_fetcher.pyvia theXTweetFetcherclass. - Boundary markers: No delimiters or protective markers are used to encapsulate the external text when presented to the agent.
- Capability inventory: The skill has the ability to write to the filesystem and execute local scripts via
subprocess. - Sanitization: There is no evidence of filtering or sanitizing the retrieved tweet content before processing.
Audit Metadata