link-scraper
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection attacks due to its core web scraping functionality.
- Ingestion points: The
fetchimplementation acrossindex.js,scrape.js, andscrape-wrapper.jsretrieves arbitrary HTML content from URLs provided by the user or discovered during research. - Boundary markers: The skill does not implement delimiters or specific instructions to the agent to ignore instructions embedded in the scraped data.
- Capability inventory: The agent using this skill has access to network requests and shell command execution via the included
send-email.jsandsend-gmail.shutilities. - Sanitization: Content is only cleaned of HTML tags and extra whitespace; it is not analyzed or sanitized for malicious instructions.
- [COMMAND_EXECUTION]: The
send-email.jsutility contains a command injection vulnerability. - The script uses
execSyncto execute the systemmailcommand with user-provided arguments. - The recipient (
to) andsubjectfields are interpolated directly into the shell command string without escaping or sanitization. - If an attacker can influence these parameters—for instance, via a hijacked agent following an indirect prompt injection—they could execute arbitrary commands on the host system.
Audit Metadata