frontend-testing
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The
scripts/with_server.pyutility usessubprocess.Popen(cmd, shell=True)andsubprocess.run(command)to execute commands provided via CLI arguments. This enables arbitrary command execution on the host system. If an attacker can manipulate the input to the agent, they could achieve code execution via shell metacharacters in the server command arguments.\n- PROMPT_INJECTION (LOW): The skill identifies a surface for indirect prompt injection as the agent is encouraged to ingest untrusted data from a browser context.\n - Ingestion points: Browser console logs, network request metadata, and DOM snapshots (referenced in
playwright-mcp-cheatsheet.mdandSKILL.md).\n - Boundary markers: No delimiters or safety instructions are provided to mitigate the risk of the agent interpreting data as instructions.\n
- Capability inventory: The agent can execute shell commands through provided scripts and interact with the browser.\n
- Sanitization: No data validation or sanitization is performed on external data before processing.\n- EXTERNAL_DOWNLOADS (LOW): The script
scripts/imgdiff.pyrequires the external Python packagepillow. Althoughpillowis a trusted library, the reliance on external dependencies increases the potential attack surface.
Audit Metadata