scrapling

Fail

Audited by Snyk on Feb 24, 2026

Risk Level: CRITICAL
Full Analysis

CRITICAL E005: Suspicious download URL detected in skill instructions.

  • Suspicious download URL detected (high risk: 0.80). Because the package is delivered from an unknown GitHub user and the skill explicitly instructs running an install script that downloads Chromium and other binaries (plus references to several untrusted/placeholder domains), these URLs represent a plausible vector for distributing malicious scripts/binaries and should be treated with caution.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The SKILL.md, CLI docs, and scripts/scrapling_fetch.py explicitly fetch arbitrary public URLs (e.g., Fetcher.get(url), DynamicFetcher.fetch, StealthyFetcher.fetch) and return/parse page.text or extracted elements, and the Spider examples parse page content and generate follow-up Requests—so untrusted third‑party web content is ingested and can directly influence subsequent actions.
Audit Metadata
Risk Level
CRITICAL
Analyzed
Feb 24, 2026, 12:30 PM