performing-osint-with-spiderfoot

Pass

Audited by Gen Agent Trust Hub on Apr 10, 2026

Risk Level: SAFE
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The scripts/agent.py script makes network requests to a SpiderFoot REST API server using the requests library. By default, it targets http://127.0.0.1:5001, which is a whitelisted local address.
  • [DATA_EXFILTRATION]: The skill processes OSINT findings, which may include sensitive data like leaked credentials (LEAKSITE_CONTENT) retrieved from the SpiderFoot server. This data is stored in a local JSON file (osint_report.json) and is not transmitted to any unauthorized external domains.
  • [COMMAND_EXECUTION]: The skill does not execute shell commands or use subprocesses.
  • [PROMPT_INJECTION]: No instructions intended to override agent behavior or safety guidelines were found in the skill metadata or instructions.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 10, 2026, 06:26 PM