ydc-crewai-mcp-integration
Pass
Audited by Gen Agent Trust Hub on Mar 4, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill explicitly recognizes a vulnerability surface for indirect prompt injection from processing arbitrary web content.
- Ingestion points: Untrusted web data enters the agent context through the results of the
you-searchandyou-contentstools as documented inSKILL.md. - Boundary markers: The author provides a specific 'trust boundary' statement to be added to agent backstories to ensure the model treats tool outputs as data only.
- Capability inventory: The integration enables agents to call remote search and content extraction tools via
MCPServerHTTPandMCPServerAdapter. - Sanitization: No programmatic sanitization of the scraped content is performed; mitigation relies on the documented prompt engineering practices.
- [EXTERNAL_DOWNLOADS]: The skill connects to the official You.com MCP endpoint at
https://api.you.com/mcpand uses standard package managers to install well-known libraries such ascrewaiandmcp. - [COMMAND_EXECUTION]: The skill requests permission to use
Bashfor routine environment setup and dependency installation usingpipanduv. - [CREDENTIALS_UNSAFE]: The skill correctly handles authentication by requiring the
YDC_API_KEYto be provided as an environment variable and explicitly cautions against hardcoding secrets in source code.
Audit Metadata