create-regression-test
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill workflow involves executing shell commands via
npx playwright testusing an interpolated{feature}name derived from user input. This creates a potential command injection surface if the feature name is not validated to exclude shell metacharacters. - Evidence: Found in
SKILL.mdworkflow and checklist sections. - [DATA_EXFILTRATION]: Generated test code includes references to
e2e/.auth/user.jsonfor loadingstorageState. This file typically contains sensitive authentication session data such as cookies or bearer tokens. - Evidence: Found in
SKILL.mdandreferences/spec-template.mdwithin thebeforeAllblock. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface (Category 8) by incorporating untrusted user input into the code generation and execution flow.
- Ingestion points: User-supplied
feature-nameargument documented inSKILL.mdfrontmatter. - Boundary markers: None identified; the input is used directly for file naming and shell command arguments.
- Capability inventory: File system write operations in the
e2e/directory and shell execution vianpx(documented inSKILL.md). - Sanitization: Not instructed; the skill relies on the agent to treat the input as a simple string.
Audit Metadata