crawl
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The script
scripts/crawl.shexecutesnpx -y mcp-remote, which downloads and runs external code from the npm registry at runtime without integrity verification. - [EXTERNAL_DOWNLOADS] (HIGH): The skill's authentication process depends on downloading the
mcp-remotepackage and connecting tohttps://mcp.tavily.com/mcpat runtime. - [DATA_EXFILTRATION] (MEDIUM): The script reads sensitive authentication tokens from the
~/.mcp-auth/directory. Accessing hidden credential caches in the user's home folder is a high-risk operation, though the severity is reduced to MEDIUM as it is required for the skill's stated OAuth functionality. - [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection as it retrieves untrusted data from the web and writes it directly to local markdown files without sanitization.
- Ingestion points: External website content fetched via
curlinscripts/crawl.sh. - Boundary markers: None identified.
- Capability inventory: Local file-write operations in
scripts/crawl.sh. - Sanitization: No validation or sanitization is performed on the content of the crawled pages.
- [COMMAND_EXECUTION] (LOW): The script uses standard shell utilities including
curl,jq,sed, andmkdirto perform its tasks.
Recommendations
- AI detected serious security threats
Audit Metadata