firecrawl-scrape

Pass

Audited by Gen Agent Trust Hub on Feb 17, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
  • [Indirect Prompt Injection] (LOW): The skill's primary function is to scrape web pages, which is a classic vector for indirect prompt injection attacks.
  • Ingestion points: Untrusted data enters the agent context via the results of the --url and --search commands executed by the firecrawl_scrape.py script.
  • Boundary markers: There are no specific instructions or delimiters provided to help the agent distinguish between its own system instructions and the scraped web content.
  • Capability inventory: The skill allows the use of Bash and Read tools, which could be abused if the agent is tricked by malicious content into executing commands.
  • Sanitization: No sanitization or filtering logic is mentioned for the scraped markdown/HTML content.
  • [Command Execution] (SAFE): The skill executes a local script using the uv package manager.
  • Evidence: uv run python -m runtime.harness scripts/mcp/firecrawl_scrape.py is used to trigger the scraper.
  • Context: This is a standard execution pattern for this environment and does not involve arbitrary command injection from user input.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 17, 2026, 06:01 PM