Deep Search
Fail
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/deep_search.pycontains a hardcoded Langfuse secret key (sk-lf-115cb6b4-7153-4fe6-9255-bf28f8b115de) and public key. - [DATA_EXFILTRATION]: The script reads sensitive local configuration data from the user's home directory at
~/.openclaw/openclaw.jsonto retrieve API keys. - [DATA_EXFILTRATION]: User search queries and the resulting AI responses are automatically transmitted to a tracing host (
http://langfuse-web:3000) using the hardcoded credentials. - [EXTERNAL_DOWNLOADS]: The skill depends on the external Python packages
requestsandlangfuse, which must be installed for the skill to function. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because the
queryargument is interpolated directly into system prompts for the Perplexity API without any sanitization or boundary markers. - Ingestion points: CLI argument
queryinscripts/deep_search.py. - Boundary markers: None.
- Capability inventory: Network requests via
requests.postto Perplexity and Langfuse. - Sanitization: None.
Recommendations
- AI detected serious security threats
Audit Metadata