moai-playwright-webapp-testing
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The utility script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute commands provided via the--serverargument. This allows for the execution of arbitrary shell commands which can be influenced by input. - [COMMAND_EXECUTION]: The
scripts/with_server.pyscript executes the final command string usingsubprocess.run, which allows the agent to run arbitrary system commands after a server is ready. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it ingests and processes untrusted data from external web pages during automated testing and selector generation.
- Ingestion points: Web application URLs accessed via
playwright.goto()inexamples/ai-powered-testing.pyandexamples/element_discovery.py, and thewebapp_urlparameter inSKILL.mdlogic. - Boundary markers: None. The skill does not use delimiters or instructions to ignore embedded commands when parsing element text or page content.
- Capability inventory: The skill is granted access to high-privilege tools including
Bash,Write, andEdit, and includes scripts that can spawn subprocesses. - Sanitization: No evidence of sanitization, escaping, or validation of content retrieved from the web page DOM was found before it is used in logic or test generation.
Audit Metadata