web-scraping
Fail
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: CRITICALEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: Indirect Prompt Injection Surface. As a web scraping tool, this skill is designed to ingest and process untrusted data from external websites (Phase 1 reconnaissance and Phase 4 implementation). This creates an attack surface for indirect prompt injection, where an adversary could embed instructions in a website's HTML or API response to influence the agent.
- Ingestion points:
proxy_list_traffic(),interceptor_chrome_devtools_snapshot()(SKILL.md), and standard scraping via Playwright/Cheerio. - Boundary markers: No specific boundary markers or explicit 'ignore instructions' delimiters for ingested data are defined in the provided templates.
- Capability inventory: The skill facilitates system command execution via Apify CLI and browser interactions via humanizer tools (SKILL.md).
- Sanitization: Explicit sanitization of external content is not implemented in the provided examples.
- [COMMAND_EXECUTION]: Development and CLI Tooling. The skill provides instructions for installing and using the Apify CLI to manage actors (
apify create,apify run,apify push). These are standard operational commands for the intended platform. Theapify/initialization.mdfile mentions the use ofsudofor troubleshooting global npm installations, which is a common but privileged operation documented for administrative context. - [EXTERNAL_DOWNLOADS]: Verified Dependency Management. The skill facilitates the download of well-known, reputable packages from the official npm registry, including
apify,crawlee, andgot-scraping. These dependencies are provided by established technology organizations and are documented neutrally. Automated scans flaggedhttps://target-site.com/api/v2/productsas malicious; however, manual analysis confirms this URL is used exclusively as a generic documentation placeholder in examples (found inREADME.md,SKILL.md, andstrategies/api-discovery.md). - [SAFE]: No Malicious Patterns Detected. A thorough review of all 54 files, including templates and scripts, reveals no evidence of obfuscation, hardcoded credentials, data exfiltration, or persistence mechanisms.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata