Code context using Exa. Finds real snippets and docs from GitHub, StackOverflow, and technical docs. Use when searching for code examples, API syntax, library documentation, or debugging help.
89
87%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Security
2 findings — 2 medium severity. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 1.00). The SKILL.md explicitly instructs the agent to use the web_search_exa tool to fetch code snippets and documentation from public third-party sources such as GitHub and StackOverflow, and to read/interpret those results as part of its workflow (extracting and acting on snippets), which exposes the agent to untrusted, user-generated content that could carry indirect prompt-injection instructions.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The skill's MCP configuration calls the external endpoint https://mcp.exa.ai/mcp?tools=web_search_exa at runtime to fetch search results/snippets that are injected into the agent's context (used to form responses and code examples), so the fetched content can directly control prompts and deliver executable code.
c6ec084
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.