webapp-testing
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute strings provided via the--servercommand-line argument. This allows for arbitrary shell command execution. - [COMMAND_EXECUTION]: Instructions in
SKILL.mdencourage the agent to treat scripts as 'black boxes' and explicitly state 'DO NOT read the source until you try running the script first'. This is a concealment pattern that reduces human/agent oversight of executable code. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from web pages.
- Ingestion points:
examples/element_discovery.py(viapage.content()),examples/console_logging.py(viapage.on("console", ...)), andSKILL.md(viapage.locator(...).all()). - Boundary markers: Absent. The skill does not use delimiters or instructions to ignore embedded commands in the web content being processed.
- Capability inventory: The agent can execute arbitrary shell commands via
scripts/with_server.pyand write files to/mnt/user-data/outputs/(seen inexamples/static_html_automation.py). - Sanitization: Absent. There is no evidence of sanitization or validation of the content retrieved from the web applications before it is processed by the agent.
Audit Metadata