seo-audit
Fail
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Upon loading, the skill automatically triggers the global installation of the
@seomator/seo-auditpackage and the download of the Chromium browser (~200MB) from external sources. - [COMMAND_EXECUTION]: The skill instructs the agent to run setup commands (
npm install,playwright install) automatically before user interaction. It also suggests usingsudofor installation and modifying file attributes withxattrin its troubleshooting guide. - [REMOTE_CODE_EXECUTION]: Executes third-party CLI tools and binaries downloaded at runtime. It also recommends disabling SSL certificate verification (
NODE_TLS_REJECT_UNAUTHORIZED=0), which is a dangerous practice allowing for potential traffic interception. - [PROMPT_INJECTION]: Vulnerable to indirect prompt injection. The skill ingests data from untrusted external URLs and formats it specifically for LLM consumption (
--format llm). Malicious actors could place instructions on audited websites to compromise the agent's logic. - [PROMPT_INJECTION]: Evidence Chain: (1) Ingestion point:
seomator audit <url>command inSKILL.md. (2) Boundary markers: None present in the instructions. (3) Capability inventory: File system access, network access, and dependency installation. (4) Sanitization: No evidence of input validation.
Recommendations
- AI detected serious security threats
Audit Metadata