Transforms, validates, and loads data in ETL pipelines. Use when building scrapers, validating NDJSON feeds, or importing data into CMS/DB targets.
100
100%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Security
2 findings — 2 medium severity. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md and REFERENCE.md explicitly run headless scrapers (Scraper Architecture and scrape-to-ndjson.js using Playwright page.goto/$$eval) that fetch and parse arbitrary public websites (e.g., public listing sites / google-maps as example sources), ingesting untrusted third-party content which is then validated and used to drive import/dedupe decisions and therefore could enable indirect prompt injection.
The skill prompts the agent to compromise the security or integrity of the user’s machine by modifying system-level services or configurations, such as obtaining elevated privileges, altering startup scripts, or changing system-wide settings.
Attempt to modify system services in skill instructions detected (high risk: 0.80). The prompt explicitly tells the agent to launch headless browsers with '--no-sandbox' and '--disable-setuid-sandbox', which instructs bypassing browser sandboxing (a security mechanism), so it encourages actions that can compromise the host even though other steps are project-level.
f5c8508
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.