ui-test
Pass
Audited by Gen Agent Trust Hub on May 19, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
browseCLI and fetches theaxe-corelibrary from a public CDN (cdnjs.cloudflare.com) to perform accessibility audits. These resources are either vendor-owned or originate from well-known, trusted services. - [COMMAND_EXECUTION]: The skill executes a variety of system commands, including
gitfor diff analysis, package managers (npm,yarn,pnpm) for dependency management, and thebrowseCLI for browser automation. It also includes instructions for users to whitelist these commands in their agent settings to reduce manual approval prompts. - [REMOTE_CODE_EXECUTION]: The skill utilizes the
browse evalfunctionality to inject and execute JavaScript within the browser context. This is primarily used for running accessibility checks, capturing performance metrics, and monitoring console logs. - [INDIRECT_PROMPT_INJECTION]: The skill processes external data such as git diffs and live web page content. This surface could theoretically be used for indirect prompt injection if malicious instructions were embedded in a codebase or on a website.
- Ingestion points:
git diffoutputs and browser content retrieved viabrowse snapshotandbrowse evalinSKILL.md. - Boundary markers: Not explicitly defined for the processed data streams.
- Capability inventory: Extensive use of
Bashfor command execution and theAgenttool for sub-agent coordination. - Sanitization: No specific sanitization or filtering of the ingested external content is mentioned.
- [DYNAMIC_EXECUTION]: The skill dynamically generates JavaScript snippets at runtime to be executed via
browse eval, enabling flexible assertions and data extraction based on the testing context.
Audit Metadata