First Seen
Feb 18, 2026
Last Scanned
Feb 22, 2026
Findings
3
Score
77/100
Findings (3)
Detects fetching external URLs and using the content as agent instructions or rules
Rules
1. **Always check** that `ARK_API Sanitize or validate all external inputs (file contents, API responses, user messages) before including them in prompts or tool calls. Implement input/output boundaries between trusted and untrusted data.
Likely FP if the matched text is the skill's own instruction set describing how to handle user input, not an actual injection payload.
Detects dangerous URI schemes or path traversal in resource fields
URL="data: Implement strict input validation on the MCP tool's parameters. Block tool calls that attempt to modify the agent's system prompt, configuration, or tool definitions.
Likely FP if the match is a tool that legitimately updates configuration (e.g., a settings manager) and mentions prompt editing only for user-facing customization.
Detects URLs fetched at runtime that control or influence agent behavior without pinning
GET "https:// + prompt Avoid loading configuration or behavior-controlling content from runtime URLs. Bundle required configurations locally or pin remote config to versioned, integrity-verified endpoints.
Likely FP if the URL in the match is a documentation link or example URL (e.g., example.com) rather than an actual runtime-fetched configuration endpoint.