xcrawl-scrape
Pass
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill employs
node -eto execute inline JavaScript for reading the local configuration file and parsing API response data. - [DATA_EXFILTRATION]: Reads the
XCRAWL_API_KEYfrom the local file~/.xcrawl/config.jsonand transmits it to the vendor's API endpoint (run.xcrawl.com) for authentication. This is consistent with the skill's stated functionality. - [EXTERNAL_DOWNLOADS]: Communicates with the vendor API at
https://run.xcrawl.comand retrieves content from arbitrary URLs provided by the user. - [PROMPT_INJECTION]: The skill processes untrusted data from external websites, creating a risk of indirect prompt injection.
- Ingestion points: Scraped content is retrieved from the XCrawl API results in the
SKILL.mdworkflows. - Boundary markers: No specific boundary markers or instructions are provided to the agent to ignore instructions embedded in the retrieved web content.
- Capability inventory: The skill is granted access to tools including
curl,node, and file manipulation commands (Read,Write,Edit,Grep). - Sanitization: The skill returns raw response bodies from the API without sanitization or filtering.
Audit Metadata