web-testing-cypress-e2e
Fail
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [CREDENTIALS_UNSAFE]: The
examples/ci-cd.mdfile contains a hardcoded PostgreSQL connection string with embedded credentials (postgres://postgres:postgres@db:5432/test) within a Docker Compose configuration example. - [COMMAND_EXECUTION]: The
examples/custom-commands.mdfile demonstrates the implementation of Cypresstasksincypress.config.tsthat execute arbitrary SQL queries (db:query) and perform database seeding/resets via HTTP requests to a local API. This provides a mechanism for interacting with the host environment or backend infrastructure. - [COMMAND_EXECUTION]: The skill references the use of
cy.exec()andcy.task(), which are powerful commands capable of executing shell scripts or Node.js code on the runner's machine. - [EXTERNAL_DOWNLOADS]: The
examples/ci-cd.mdandexamples/accessibility.mdfiles include instructions to download and use external dependencies such asaxe-core,cypress-axe, and official Cypress Docker images (cypress/browsers).
Recommendations
- AI detected serious security threats
Audit Metadata