accessibility-compliance-accessibility-audit
Pass
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The
AccessibilityReportGeneratorinresources/implementation-playbook.mdgenerates an HTML report by directly interpolating data fromauditResultsinto an HTML string using template literals. This creates a surface for indirect prompt injection (XSS). - Ingestion points: Data enters the system via the
urlparameter inrunFullAudit, which is then processed byaxe-core. Findings are stored in theauditResultsobject (specificallyv.helpandv.description). - Boundary markers: No delimiters or instructions to ignore embedded code are present in the report generation template.
- Capability inventory: The skill provides code to launch a headless browser using
puppeteerand execute shell commands in CI/CD environments as seen inresources/implementation-playbook.md. - Sanitization: The
generateHTMLReportmethod lacks any HTML escaping or sanitization of the values injected from theauditResultsobject. - [EXTERNAL_DOWNLOADS]: The skill provides configuration for GitHub Actions in
resources/implementation-playbook.mdthat references official repositories from theactionsorganization, such asactions/checkout,actions/setup-node, andactions/upload-artifact. These are recognized as trusted sources. It also references standard testing packages from the npm registry. - [COMMAND_EXECUTION]: The provided code samples in
resources/implementation-playbook.mdinclude calls topuppeteer.launch()to initiate browser sessions and variousnpmlifecycle scripts for environment setup and testing. These operations are aligned with the skill's primary objective of conducting digital accessibility audits.
Audit Metadata