skills/alsk1992/cloddsbot/sandbox/Gen Agent Trust Hub

sandbox

Pass

Audited by Gen Agent Trust Hub on Feb 20, 2026

Risk Level: SAFEPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
  • Indirect Prompt Injection (LOW): The skill processes arbitrary HTML content via the /sandbox push command, which creates a surface for indirect prompt injection if the source of the HTML is untrusted.\n
  • Ingestion points: index.ts (argument for the /sandbox push command).\n
  • Boundary markers: None detected; instructions are not delimited or warned against.\n
  • Capability inventory: Launching a local HTTP server (startServer), rendering HTML, and capturing screenshots (snapshot) through an internal CanvasService.\n
  • Sanitization: No sanitization of the input HTML is performed before rendering.\n- Remote Code Execution (LOW): The skill facilitates the execution of JavaScript within the rendered HTML canvas. While disabled by default, the environment variables CANVAS_ALLOW_JS_EVAL and ALLOW_UNSAFE_SANDBOX indicate that the underlying service can execute arbitrary scripts. Although this represents dynamic execution of code provided in inputs (typically MEDIUM severity), the risk is lowered because it is the primary purpose of a sandbox-themed skill.
Audit Metadata
Risk Level
SAFE
Analyzed
Feb 20, 2026, 08:52 PM