qa
Warn
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructs the agent to execute a shell command using a URL provided by the user without explicit validation or sanitization. This allows for potential command injection if a malicious URL containing shell metacharacters (e.g.,
;,&&, or backticks) is provided. - Evidence:
curl -s -o /dev/null -w "%{http_code}" <url>inSKILL.md. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it ingests untrusted data from external or local web pages and processes it to make decisions about test steps.
- Ingestion points: The skill uses
browser_snapshotinSKILL.mdto read page content and look for UI elements and login forms. - Boundary markers: While the skill uses a subagent prompt template, it lacks explicit instructions to ignore natural language instructions embedded within the target website's HTML or text.
- Capability inventory: The agent has access to shell commands (
curl,mkdir,grep,echo), file system modifications (creating.qadirectory and updating.gitignore), and full browser interaction capabilities (Playwright MCP). - Sanitization: No sanitization, filtering, or content security policy is applied to the data retrieved from the
browser_snapshotbefore it is processed by the agent.
Audit Metadata