test-mobile-app
Fail
Audited by Gen Agent Trust Hub on Apr 13, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/check_environment.pyutilizessubprocess.runto execute system commands includingadb,emulator, andavdmanagerto verify the Android development environment. While these are currently limited to status checks, they represent an execution surface for local tools. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection by ingesting untrusted content from APK files during the analysis phase.
- Ingestion points:
scripts/analyze_apk.pyextracts activity names, permissions, and string resources from user-provided APK files. - Boundary markers: Absent. The extracted metadata is directly used in the workflow to generate user-facing test cases and scenarios.
- Capability inventory: The skill possesses the ability to execute shell commands via
adband perform network operations viaurllibandappiumclient. - Sanitization: Absent. No validation or escaping is performed on the extracted APK strings before they are presented to the agent for logic generation.
- [EXTERNAL_DOWNLOADS]: The skill performs a network request to
http://localhost:4723/statususingurllib.request.urlopento check the status of the local Appium server. While targeting localhost, this involves processing external JSON data from a network service. - [COMMAND_EXECUTION]: In
scripts/check_environment.py, the skill uses the__import__function to dynamically load Python modules (pytest,jinja2,pillow) to verify that the required environment dependencies are installed.
Recommendations
- HIGH: Downloads and executes remote code from: http://localhost:4723/status - DO NOT USE without thorough review
Audit Metadata