qa-test
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/with_server.pyutility usessubprocess.Popenandsubprocess.runto execute shell commands provided via command-line arguments. While it employsshlex.splitfor argument parsing, the script serves as a generic command runner that executes instructions generated by the agent, which could be manipulated to perform unauthorized actions. - [PROMPT_INJECTION]: The skill workflow is centered on reading and processing untrusted data from Jira tickets (specifically the 'For QA' and 'Dev Handoff' sections) and external specification files. This data is used to generate Playwright test scripts and define agent behavior, creating an indirect prompt injection surface.
- Ingestion points: Jira ticket descriptions, Dev Handoff comments, and specification files extracted via MCP tools or user-provided paths.
- Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are present in the skill's logic when processing Jira content.
- Capability inventory: The skill has the capability to write Python/TypeScript files and execute arbitrary shell commands via the
with_server.pyscript and Playwright. - Sanitization: There is no evidence of sanitization, validation, or escaping of the content ingested from Jira before it is interpolated into test generation prompts.
Audit Metadata