Firecrawl Search

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a straightforward Firecrawl API wrapper; it uses a Firecrawl API key and can fetch or crawl web content, but the artifacts show no hidden exfiltration or destructive behavior.

Before installing, make sure you trust using Firecrawl for your searches, scrapes, and crawls; set FIRECRAWL_API_KEY only if you are comfortable spending that account’s quota. Treat returned webpage content as untrusted, and confirm crawl targets and limits before starting larger crawls.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

64/64 vendors flagged this skill as clean.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI01: Agent Goal Hijack
Low
What this means

A malicious or compromised webpage could include text that tries to influence the agent’s next actions.

Why it was flagged

The skill can retrieve arbitrary webpage text and place it into the agent-facing output. This is expected for a scraper, but webpage content should be treated as untrusted and not as instructions to the agent.

Skill content
parser.add_argument("url", help="URL to scrape") ... print(data["markdown"])
Recommendation

Treat scraped and searched content as untrusted reference material; confirm any instructions or actions suggested by web content before following them.

#
ASI02: Tool Misuse and Exploitation
Low
What this means

Using crawl commands may spend Firecrawl credits and request multiple pages from a target site.

Why it was flagged

The crawl script can start a Firecrawl crawl job for a supplied URL, with a default page limit. This is purpose-aligned, but it can consume API quota and cause external crawling activity.

Skill content
req_url = "https://api.firecrawl.dev/v1/crawl" ... parser.add_argument("--max-pages", type=int, default=50, help="Max pages to crawl")
Recommendation

Confirm crawl targets and page limits before use, and monitor Firecrawl quota or billing.

#
ASI03: Identity and Privilege Abuse
Low
What this means

Anyone running the skill with a valid API key allows it to use that Firecrawl account and quota.

Why it was flagged

The script reads a Firecrawl API key from the environment and sends it as a bearer token to the Firecrawl API. This is expected for the stated integration, but it is still delegated account access.

Skill content
api_key = os.environ.get("FIRECRAWL_API_KEY") ... "Authorization": f"Bearer {api_key}"
Recommendation

Use a Firecrawl key you intend to use with this skill, keep it private, rotate it if exposed, and prefer account-level limits where available.

#
ASI04: Agentic Supply Chain Vulnerabilities
Info
What this means

Users may not see the credential requirement or publisher provenance from metadata alone.

Why it was flagged

The registry metadata provides limited provenance and does not declare the API key requirement that SKILL.md and the scripts use. The included code is simple and purpose-aligned, so this is a disclosure/provenance note rather than a concern.

Skill content
Source: unknown; Homepage: none; Required env vars: none; Env var declarations: none; Primary credential: none
Recommendation

Review the included scripts before installing and prefer updated metadata that declares FIRECRAWL_API_KEY and a verifiable project source.