web-content-extractor
Pass
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it fetches content from arbitrary external URLs and instructs the agent to use that content to answer questions or process data.
- Ingestion points: External content fetched via
curlinSKILL.md. - Boundary markers: Absent; there are no instructions to the agent to ignore or delimit instructions found within the fetched content.
- Capability inventory: Uses
shell_executewithcurlfor network requests. - Sanitization: Absent; the skill does not specify any validation or filtering of the fetched Markdown content.
- [COMMAND_EXECUTION]: The skill utilizes
shell_executeto runcurlcommands with user-provided URLs. While it provides instructions to wrap URLs in quotes to prevent shell meta-character exploitation, this remains a significant execution surface. - [EXTERNAL_DOWNLOADS]: The skill is designed to download data from external services (
defuddle.mdandr.jina.ai). These are well-known tools for web content extraction, and their use is central to the skill's stated purpose.
Audit Metadata