last30days-surf
Pass
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONCREDENTIALS_UNSAFE
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill fannouts research queries to numerous external platforms, including Reddit, X/Twitter, YouTube, GitHub, Hacker News, Polymarket, and various other social networks. Most traffic is routed through the
surf.cascade.fyiAPI, while some sources use direct HTTP requests to public JSON endpoints for free-tier access. - [COMMAND_EXECUTION]: Subprocess execution is used appropriately for development and metadata retrieval.
lib/github.pyattempts to run thegh(GitHub CLI) tool to fetch authentication tokens. Testing and verification scripts (verify_v3.py,evaluate.py) usesubprocessto run local Python scripts andgitcommands for worktree management during evaluations. - [CREDENTIALS_UNSAFE]: The skill manages sensitive API keys (
SURF_API_KEY,GITHUB_TOKEN) using environment variables and configuration files. It includes a security helper inlib/env.pythat checks the file system permissions of the.envconfiguration file and warns the user if it is world-readable, recommendingchmod 600for protection. - [PROMPT_INJECTION]: The skill is specifically hardened against indirect prompt injection (attacks embedded in the scraped research data). Both the query planner and the reranking logic use a mandatory
<untrusted_content>fence in LLM prompts, accompanied by clear instructions to the agent to treat the enclosed content strictly as data and never as executable instructions.
Audit Metadata