webapp-testing
Pass
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/with_server.pyutilizessubprocess.Popenwithshell=Trueto launch local servers. This behavior is necessary for the skill's purpose of testing applications that require active server processes. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it reads and interacts with external web content.
- Ingestion points: Data is ingested from web pages in
examples/element_discovery.pyandexamples/console_logging.pyvia Playwright locators. - Boundary markers: No specific delimiters or safety instructions are used to separate web content from agent instructions.
- Capability inventory: The skill can execute shell commands through the
with_server.pyscript and write to the filesystem. - Sanitization: There is no evidence of content sanitization for data retrieved from the browser DOM.
Audit Metadata