testing-e2e
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill is designed to ingest untrusted data from the web using
browser_navigateandbrowser_snapshot. There are no boundary markers or sanitization procedures defined to distinguish between tool instructions and website content. An attacker-controlled website could include malicious prompts that the agent might execute using itsmcp__playwright__*tools. - Ingestion points: Web content retrieved via
browser_navigateandbrowser_snapshot. - Boundary markers: None present.
- Capability inventory: Full browser control (clicking, typing, form filling) and the ability to spawn subagents via
Task(). - Sanitization: None present.
- Command Execution (MEDIUM): The documentation encourages the use of
npx playwright testand dynamic test generation (/test:e2e generate). If the agent generates or executes code based on input from a malicious website (via indirect injection), it could lead to the execution of arbitrary code on the local system.
Recommendations
- AI detected serious security threats
Audit Metadata