html-get
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fetches HTML content and associated assets from arbitrary remote URLs provided at runtime to perform its primary scraping functions.
- [COMMAND_EXECUTION]: Documentation provides instructions for installing dependencies and executing the
html-getutility vianpx. It also mentions the potential use ofmutoolfor PDF-to-HTML conversion. - [REMOTE_CODE_EXECUTION]: The skill utilizes Puppeteer and Browserless to execute JavaScript within a headless browser. This is the intended mechanism for rendering JavaScript-heavy web pages and does not represent an unauthorized execution vulnerability.
- [PROMPT_INJECTION]: As the skill ingests untrusted data from external websites, it presents a surface for indirect prompt injection.
- Ingestion points: Arbitrary external URLs are processed via the
getHTMLfunction inSKILL.md. - Boundary markers: No specific delimiters or "ignore instructions" markers are defined for the fetched content in the provided documentation.
- Capability inventory: The skill can perform network requests, render JavaScript, and rewrite HTML structure.
- Sanitization: While the skill normalizes URLs and meta tags, there is no mention of sanitizing the HTML body to prevent the agent from following embedded instructions.
Audit Metadata