deco-e2e-testing
Pass
Audited by Gen Agent Trust Hub on Mar 11, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
run-e2e.tsscript usesDeno.Commandto spawn and manage local processes, including the site's development server (deno task dev) and the test runner (npm test). The script is executed with Deno's-Aflag, granting full system permissions. - [INDIRECT_PROMPT_INJECTION]: The
MetricsCollectorutility inmetrics-collector.tsextracts and logs metadata from the target website via response headers (x-deco-section) and URL parameters (props,resolveChain). This data is displayed to the agent or user, representing an injection surface. - Ingestion points:
extractSectionNameandextractNameFromPropsfunctions intemplates/utils/metrics-collector.ts. - Boundary markers: None present.
- Capability inventory: Subprocess management in
run-e2e.tsand local file writes inbaseline.ts. - Sanitization: Content is decoded and parsed but not sanitized before being logged or stored in reports.
- [REMOTE_CODE_EXECUTION]: The
scaffold.shshell script performs dynamic code generation by modifying local templates with site-specific values viased. Additionally, the skill's workflow involves installing external dependencies from the NPM registry. - [DATA_EXPOSURE]: In
run-e2e.ts, the script passes the entire local environment context (Deno.env.toObject()) to the spawned test process, which may lead to the unintended exposure of sensitive environment variables to the test logs or environment.
Audit Metadata