geo-audit-report
Fail
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: CRITICAL
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill correctly handles the
BRIGHTDATA_API_KEYby instructing users to set it as an environment variable (export BRIGHTDATA_API_KEY="..."). It explicitly warns against printing the key or sharing it in the chat interface, which is an excellent security practice. - [COMMAND_EXECUTION]: The skill uses a dynamic context check (
!if [ -z "$BRIGHTDATA_API_KEY" ]...) to verify if required credentials are set before execution. This is a benign use of the feature for environment validation. - [DATA_EXFILTRATION]: The Python collection script (
brightdata-geo.py) makes network requests toapi.brightdata.com. This is the intended behavior for interacting with the Bright Data API to trigger and download dataset snapshots. No unauthorized data exfiltration patterns were detected. - [EXTERNAL_DOWNLOADS]: The skill's React template utilizes standard dependencies from the npm registry (e.g., Vite, React, Tailwind CSS). While an automated scanner flagged a specific
esbuildbinary URL, this originates from the officialregistry.npmjs.orgdomain, which is a well-known and trusted service for package management. - [PROMPT_INJECTION]: The
SKILL.mdinstructions focus on defining a professional workflow for prompt discovery and data analysis. There are no patterns suggesting attempts to bypass AI safety filters or override system constraints. - [INDIRECT_PROMPT_INJECTION]: The React dashboard visualizes data collected from external LLM responses. The application renders this content using standard React text elements (
ptags withwhitespace-pre-wrap) and does not use dangerous methods likedangerouslySetInnerHTML, effectively mitigating the risk of script injection from untrusted audit results.
Recommendations
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata