ollama-search
Pass
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill interacts with external APIs to fetch web data.
- Evidence: Requests are sent to
https://ollama.com/api/web_searchandhttps://ollama.com/api/web_fetchusingcurlinscripts/ollama-search.shandscripts/ollama-fetch.sh. - [COMMAND_EXECUTION]: The skill requires the execution of system binaries to function.
- Evidence: Uses
bash,curl, andjqas specified in theSKILL.mdmetadata and implemented in thescripts/directory. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it processes untrusted content from the internet.
- Ingestion points: Web search snippets and full page content are ingested via
scripts/ollama-search.shandscripts/ollama-fetch.sh. - Boundary markers: Absent; the skill instructions in
SKILL.mdadvise the agent to summarize results without providing specific delimiters or warnings to ignore embedded instructions. - Capability inventory: The agent can execute shell commands (
bash,curl,jq) via the OpenClaw environment. - Sanitization: The scripts use
jqto parse structured JSON, but the raw text content from external websites is passed to the model without further sanitization or filtering.
Audit Metadata