fetch4ai
Fail
Audited by Gen Agent Trust Hub on Apr 14, 2026
Risk Level: CRITICALPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill facilitates indirect prompt injection by ingesting and processing untrusted data from arbitrary external websites. Malicious instructions embedded in fetched webpages could potentially influence the agent's behavior when the content is added to its context.
- Ingestion points: The
scripts/fetch4ai.pyscript fetches content from user-specified URLs using thecrawl4ailibrary. - Boundary markers: The script returns the cleaned markdown content without explicit boundary delimiters or instructions for the agent to ignore embedded commands within the fetched data.
- Capability inventory: The skill is granted
Bash,Read, andWritetool permissions, which increases the potential impact of a successful injection. - Sanitization: While the skill uses sophisticated filtering (BM25, pruning) to remove noise and improve content quality for LLMs, it does not perform security-focused sanitization to detect or block adversarial instructions.
- [EXTERNAL_DOWNLOADS]: The skill relies on external dependencies and references external resources.
- Dependencies: The skill requires the installation of the
crawl4aiPython package and the execution ofcrawl4ai-setupto download Playwright browser binaries. - URL References: The documentation in
SKILL.mdandreferences/filtering-strategies.mduseshttps://example-news.com/articleas an example URL. This specific domain has been flagged by security scanners, though it is used here only as a placeholder for threshold tuning examples and is not executed by the script itself.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata