develop-web-game
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill navigates to external URLs and executes code within the page context to extract state.
- Ingestion points: The
web_game_playwright_client.jsscript navigates to a user-provided URL (--url) and callswindow.render_game_to_text()and captures console errors. - Boundary markers: None. The script takes raw input from the web page's JavaScript environment.
- Capability inventory: The script has file-system write access (
fs.writeFileSync) and saves screenshots, game state, and console errors to the workspace. The agent is specifically instructed to 'Review console errors and fix' them and 'read progress.md', creating a feedback loop where an attacker-controlled web page can influence the agent's code modifications. - Sanitization: No sanitization is performed on the data returned from
render_game_to_textor console logs before writing to disk. - External Downloads (LOW): The skill recommends installing
@playwright/mcpandplaywright. While these are powerful tools, the author 'openai' is within the [TRUST-SCOPE-RULE], downgrading the download risk itself to LOW. - Command Execution (MEDIUM): The skill relies on executing a Node.js script that controls a headless browser. While the script's logic is visible, the browser automation capability allows it to interact with any web-accessible content, which serves as a vector for the high-severity indirect injection findings.
Recommendations
- AI detected serious security threats
Audit Metadata