Jina Web Fetcher - 网页抓取

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could fetch arbitrary web pages or search results through a proxy, which may violate site policies or retrieve content the user did not intend to access.

Why it was flagged

The skill intentionally exposes broad arbitrary-URL fetching and describes it as bypassing search-engine restrictions. This is disclosed and aligned with the skill purpose, but it can be misused if applied to sites or searches the user should not scrape.

Skill content
description: 使用 Jina AI 抓取网页内容,绕过搜索引擎限制。支持任意URL,支持 Google 搜索结果抓取。
Recommendation

Use it only for URLs and searches you are allowed to access, avoid automated bulk scraping, and confirm sensitive targets before running the curl command.

What this means

If a URL or search query contains private information, tokens, or sensitive terms, that information may be exposed to the third-party fetch service.

Why it was flagged

All fetched target URLs are sent to the external r.jina.ai service. This is expected for the skill, but it means Jina AI can observe the requested URLs and related query strings.

Skill content
curl -s "https://r.jina.ai/http://目标URL"
Recommendation

Do not use this skill with private intranet URLs, secret-bearing links, access tokens in query strings, or sensitive search queries unless you are comfortable sending them to Jina AI.