page-monitoring
Pass
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill creates a surface for indirect prompt injection by design, as it is built to ingest and process content from arbitrary web pages which could contain malicious instructions.
- Ingestion points: The
PageMonitor._get_page_hashandRSSGenerator.add_from_pagemethods inSKILL.mdfetch content from external URLs using therequestslibrary. - Boundary markers: No boundary markers or specialized instructions are used to distinguish untrusted web content from legitimate agent instructions when stored or forwarded to alerts.
- Capability inventory: The skill possesses the ability to send network requests (via
requests), send emails (viasmtplib), and execute command-line tools (viasubprocess). - Sanitization: Content processing is limited to length truncation for previews; no escaping or sanitization of potential injection strings is performed.
- [EXTERNAL_DOWNLOADS]: The skill documentation suggests installing several third-party libraries and tools, including the
twarcandfeedgenPython packages, and running a Docker container from therssbridgeproject. These are established tools in the monitoring and archiving space. - [COMMAND_EXECUTION]: The
TwitterArchiverclass inSKILL.mdutilizessubprocess.runto execute thetwarc2command-line utility. While it correctly uses list-based argument passing to minimize shell injection risks, it still involves the execution of external binaries based on user-provided input parameters.
Audit Metadata