confluence-browser-fetch
Warn
Audited by Gen Agent Trust Hub on May 8, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [DATA_EXFILTRATION]: The script may transmit sensitive session cookies to non-Atlassian domains.
- In
scripts/confluence-browser-fetch.js, theresolveInputToPageIdfunction accepts a URL as input and performs afetchrequest to it, including the Atlassian sessionCookieheader without verifying the destination domain. - The
downloadAttachmentsfunction in the same file follows absolute URLs found in the_links.downloadmetadata returned by the Confluence API and includes theCookieheader in those requests, which could lead to cookie theft if the API returns a malicious URL. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection vulnerability surface.
- Ingestion points: Content is fetched from Confluence REST API and browser-rendered HTML in
scripts/confluence-browser-fetch.jsand stored in theraw/confluence/directory. - Boundary markers: Absent. The fetched content is saved raw without delimiters or instructions to ignore embedded prompts.
- Capability inventory: The skill performs file writes (
fsp.writeFile) and network requests (fetch). - Sanitization: Filenames are sanitized for path safety using
slugifyandsafeNameinscripts/lib.js, but the page content remains unsanitized. - [EXTERNAL_DOWNLOADS]: The script downloads page data and attachments from Atlassian Cloud domains as part of its core functionality.
- [COMMAND_EXECUTION]: The Node.js script executes filesystem management operations and network requests.
- [SAFE]: The skill correctly uses
slugifyandsafeNameinscripts/lib.jsto prevent path traversal vulnerabilities when creating directories and files based on external metadata.
Audit Metadata