scraping-tweets-by-keyword
Warn
Audited by Gen Agent Trust Hub on May 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill defines a
customMapFunctionparameter which is described as a "JavaScript function to transform each output object." This creates a dynamic execution sink where user or agent-provided code is executed at runtime. Additionally, the skill instructions include the execution of local scripts and system commands. - Evidence:
node scripts/run_actor.jsis called multiple times to run the scraping logic. - Evidence:
curlis used to interact with the Apify REST API, including passing theAPIFY_TOKENin the URL query string. - [PROMPT_INJECTION]: The skill has a vulnerability surface for indirect prompt injection because it retrieves and processes untrusted third-party content.
- Ingestion points: Raw tweet text and metadata are fetched from Twitter using the
apidojo/tweet-scraperactor and presented to the agent (SKILL.md). - Boundary markers: The skill uses Markdown tables for output formatting but lacks explicit instructions or delimiters to warn the agent against executing commands embedded within the retrieved tweets.
- Capability inventory: The execution environment allows for shell command execution (
node,curl) and network requests to external domains (api.apify.com). - Sanitization: No sanitization or filtering logic is provided to handle potentially malicious instructions within the scraped tweet data.
Audit Metadata