webapp-testing
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The helper script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute server commands provided via the--serverargument. It also usessubprocess.runto execute the final automation command. This allows for arbitrary shell command execution on the host system. - Evidence:
process = subprocess.Popen(server['cmd'], shell=True, ...)andresult = subprocess.run(args.command)inscripts/with_server.py. - [DATA_EXFILTRATION]: Example scripts capture browser console logs and screenshots, saving them to local file paths. If the web application under test outputs sensitive information (e.g., tokens, PII) to the console, this data could be exposed or exfiltrated if the output directory is accessible to an attacker.
- Evidence:
page.on("console", handle_console_message)andwith open('/mnt/user-data/outputs/console.log', 'w') as f:inexamples/console_logging.py. - [PROMPT_INJECTION]: The
SKILL.mdfile contains instructions that could be interpreted as a form of indirect prompt injection by discouraging the agent from reading the source code of the scripts and instead relying on running them with--help. This 'black-box' approach could hide malicious behavior within the scripts from the agent's analysis. - Evidence: 'DO NOT read the source until you try running the script first... These scripts can be very large and thus pollute your context window.' in
SKILL.md.
Audit Metadata