test-ui
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (HIGH): The
evaluate.jsscript allows for the execution of arbitrary JavaScript within the page context usingeval(). This presents a significant risk if the agent is directed by an untrusted source to execute specific scripts. - CREDENTIALS_UNSAFE (HIGH): The
inject-auth.jsscript and the sharedlib/browser.jsutility store sensitive authentication data, including session cookies and bearer tokens, in a plain-text local file named.auth-session.json. These secrets persist for 24 hours and are not encrypted. - PROMPT_INJECTION (HIGH): The skill is highly susceptible to Indirect Prompt Injection (Category 8) due to its core functionality.
- Ingestion points: Data is ingested from untrusted external websites via
snapshot.js(DOM tree),console.js(logs),network.js(traffic), andaria-snapshot.js(accessibility tree). - Boundary markers: None. Ingested data is returned to the agent without delimiters or warnings to ignore embedded instructions.
- Capability inventory: The skill has extensive capabilities, including full browser automation, network request monitoring, and arbitrary script execution.
- Sanitization: While
lib/selector.jsattempts to sanitize XPath selectors for common injection patterns, no sanitization is performed on the data scraped from web pages before it is presented to the agent. - COMMAND_EXECUTION (MEDIUM): The
install-deps.shscript requires root privileges (sudo) to install a large number of system dependencies. While these are standard for Puppeteer, the execution of package managers with elevated privileges poses a risk of system-wide modification.
Recommendations
- AI detected serious security threats
Audit Metadata