xcrawl-crawl
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
node -eto execute dynamic JavaScript snippets that read theXCRAWL_API_KEYfrom a local file (~/.xcrawl/config.json) and parse JSON data from API responses. - [EXTERNAL_DOWNLOADS]: The skill initiates network requests to the vendor's API at
run.xcrawl.comand directs users todash.xcrawl.comfor account and credit management. - [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface because it retrieves raw content from arbitrary external websites and returns it to the agent without sanitization or boundary delimiters.
- Ingestion points: Data is ingested through the
GET /v1/crawl/{crawl_id}endpoint, which returns the results of crawled pages. - Boundary markers: There are no explicit delimiters or system instructions to the agent to treat the crawled content as untrusted or to ignore instructions embedded within it.
- Capability inventory: The skill allows the agent to execute shell commands (via
curlandnode) and perform file system operations (Read,Write,Edit,Grep). - Sanitization: The skill does not perform any validation, escaping, or filtering of the external content before delivering it to the agent's context.
Audit Metadata