Scrape reviews, ratings, and brand mentions from multiple platforms using Apify Actors.
72
66%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Advisory
Suggest reviewing before use
Optimize this skill with Tessl
npx tessl skill review --optimize ./skills/apify-brand-reputation-monitoring/SKILL.mdSecurity
2 findings — 2 medium severity. This skill can be installed but you should review these findings before use.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The skill runs Apify actors that scrape public, user-generated content (e.g., Google Maps, Facebook, Instagram, TripAdvisor, YouTube, TikTok) and then downloads and displays dataset items from the Apify dataset API (https://api.apify.com/v2/datasets/${datasetId}/items?...), so the agent directly ingests and acts on untrusted third‑party content which could contain injected instructions.
The skill fetches instructions or code from an external URL at runtime, and the fetched content directly controls the agent’s prompts or executes code. This dynamic dependency allows the external source to modify the agent’s behavior without any changes to the skill itself.
Potentially malicious external URL detected (high risk: 0.90). The skill performs runtime requests to mcp.apify.com (via the mcpc command in Step 2) to fetch Actor input schemas that can directly control prompting/inputs and it calls https://api.apify.com/v2/... to start Apify actor runs (which execute remote code), so these external endpoints are runtime dependencies that meet the flagged criteria.
1a9f5ac
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.