browsing-bluesky
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes local scripts to perform specialized analysis tasks. It runs a Node.js script for real-time firehose sampling and generates a temporary Python script string that is executed via a subprocess to perform keyword extraction using an external virtual environment.\n
- Evidence:
scripts/bsky.pyusessubprocess.runin thesample_firehoseandextract_keywordsfunctions to executezeitgeist-sample.jsand a dynamically generated Python script respectively.\n- [EXTERNAL_DOWNLOADS]: The documentation instructs users to install standard Node.js dependencies from the public npm registry to enable firehose sampling functionality.\n - Evidence:
README.mdandSKILL.mdspecifynpm install ws https-proxy-agentfor the environment setup.\n- [PROMPT_INJECTION]: The skill processes untrusted data (posts, bios, and firehose data) from the Bluesky network, which presents an indirect prompt injection surface if the agent treats this data as instructions.\n - Ingestion points:
get_user_posts,search_posts,get_feed_posts, andsample_firehoseinscripts/bsky.pyretrieve external text content from Bluesky APIs and WebSockets.\n - Boundary markers: The skill does not implement delimiters or safety instructions when returning extracted post content.\n
- Capability inventory: The skill can execute shell commands via
subprocess.runand perform network operations via therequestslibrary.\n - Sanitization: No sanitization is performed on the ingested text to mitigate the risk of instruction injection.
Audit Metadata