1c-web-session
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
SKILL.mdfile defines a 'clipboard loader' pattern that uses(0, eval)to execute JavaScript source code read from the system clipboard. This allows for the execution of arbitrary, unverified code and bypasses static security checks. - [COMMAND_EXECUTION]: The skill utilizes the
mcp__playwright__browser_run_codetool to execute logic that has access to Node.js system modules likefsandpath. Scripts such as1c-screenshot.jsperform file system operations including directory creation and recursive file deletion. - [CREDENTIALS_UNSAFE]: The
scripts/1c-login.jsutility accepts cleartext passwords as arguments to perform automated logins. This approach exposes sensitive credentials within the agent's execution context and potentially in logs. - [DATA_EXFILTRATION]: The skill includes functionality to capture screenshots and extract all visible form fields (
visibleFields) from the 1C interface using1c-snapshot.js, which may contain sensitive business data. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from the 1C web interface (via
document.querySelectorAllin1c-snapshot.js) without sanitization or boundary markers. This data is then used in the agent's context and can influence subsequentbrowser_run_codecalls.
Audit Metadata