microlink-api
Pass
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill facilitates the ingestion of data from external, untrusted URLs (e.g., in
metadata.mdandpage-text.md), which creates a surface for indirect prompt injection where malicious instructions could be embedded in the source content. \n - Ingestion points:
mqlfunction calls inSKILL.mdand workflow files likepage-markdown.md. \n - Boundary markers: Not present; the skill does not instruct the agent to use delimiters or specific warnings to ignore instructions in fetched content. \n
- Capability inventory: The skill enables network requests and structured data extraction via the Microlink API. \n
- Sanitization: Absent; content from target URLs is passed to the agent without filtering or sanitization. \n- [REMOTE_CODE_EXECUTION]: Documents the use of the
functionandevaluateparameters of the Microlink API, which allow executing JavaScript within a remote headless browser environment. This is an intended feature of the well-known Microlink service. \n- [EXTERNAL_DOWNLOADS]: Recommends the installation of the@microlink/mqland@microlink/clipackages from the official NPM registry and references theesm.shCDN.
Audit Metadata