capture-hubtoday-chrome-dev
Pass
Audited by Gen Agent Trust Hub on Apr 19, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: Executes a local Python script
scripts/capture_daily_sources.pyto automate the data collection and file generation process. - [EXTERNAL_DOWNLOADS]: Fetches AI news and blog updates from official sources including HubToday, OpenAI, Anthropic (Claude), and Chrome Developers. Requests are proxied through the Jina AI reader service (
https://r.jina.ai/) to obtain markdown formatted content. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface because it ingests data from untrusted external sources and writes it to the local file system.
- Ingestion points: HubToday sidebar URLs and official blog RSS feeds for Chrome, OpenAI, and Claude (identified in
scripts/capture_daily_sources.py). - Boundary markers: Absent; the content is saved directly to markdown files without delimiters or instructions to ignore embedded commands.
- Capability inventory: File write operations to specific local paths using the
pathliblibrary (identified inscripts/capture_daily_sources.py). - Sanitization: No filtering, escaping, or validation of the fetched external text content is performed before it is written to disk.
Audit Metadata