firecrawl
Pass
Audited by Gen Agent Trust Hub on Apr 18, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: Fetches data from the official Firecrawl API (api.firecrawl.dev), which is a well-known service for web scraping.
- [COMMAND_EXECUTION]: Executes shell commands including
curlfor API requests,jqfor parsing JSON data, and platform-specific diagnostic tools likezero doctor. It also involves local file system operations, such as writing request configuration to/tmp/firecrawl_request.jsonand saving scraped output to markdown files. - [DATA_EXFILTRATION]: Transmits user-provided URLs and natural language instructions (prompts for AI extraction) to the external Firecrawl API. This behavior is inherent to the scraping and data extraction features of the service.
- [PROMPT_INJECTION]: The skill presents a surface for indirect prompt injection because it ingests and processes content from arbitrary external websites that could contain malicious instructions.
- Ingestion points: Web content retrieved from various domains via the Firecrawl API (SKILL.md).
- Boundary markers: The instructions do not include specific delimiters or warnings to the agent to prevent it from executing instructions found within the scraped content.
- Capability inventory: The environment allows network operations via
curland file-writing capabilities (SKILL.md). - Sanitization: There are no mechanisms described for sanitizing or filtering the scraped content before it is processed by the agent.
Audit Metadata