fetch-url-as-markdown
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill fetches content from arbitrary external URLs and presents it to the agent, which can lead to indirect prompt injection if the source content contains malicious instructions.\n
- Ingestion points: The
scripts/fetch_url.pyscript downloads raw HTML/text data from user-supplied URLs.\n - Boundary markers: Absent. The output is provided directly as Markdown without protective delimiters or instructions to the agent to ignore embedded commands.\n
- Capability inventory: The agent is instructed to execute local Python scripts and invoke other MCP tools (like Exa) based on the input.\n
- Sanitization: The skill uses the
trafilaturalibrary to extract main text and convert it to Markdown, which removes code tags but does not filter semantic instructions.\n- [COMMAND_EXECUTION]: The skill workflow requires the agent to execute a bundled Python script (fetch_url.py) and suggests installing dependencies viapip install --break-system-packages trafilatura.\n- [EXTERNAL_DOWNLOADS]: The core functionality of the skill involves downloading content from remote, user-defined URLs using thetrafilaturalibrary.
Audit Metadata