layout-inspecting

Pass

Audited by Gen Agent Trust Hub on Mar 2, 2026

Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [EXTERNAL_DOWNLOADS]: The script inspect_layout.js automatically installs the Node.js packages playwright, blessed, and canvas from the npm registry and downloads the Chromium browser. These are well-known tools from established sources.
  • [COMMAND_EXECUTION]: The skill uses child_process.spawnSync to execute system commands for dependency installation (npm install) and browser setup (playwright install chromium) during initialization.
  • [PROMPT_INJECTION]: The skill exposes an indirect prompt injection surface (Category 8).
  • Ingestion points: The buildLayoutTree function in inspect_layout.js extracts text snippets and DOM attributes from any remote URL it is directed to visit.
  • Boundary markers: Content is returned in a standard JSON format without specific delimiters or warnings to the downstream agent regarding untrusted embedded content.
  • Capability inventory: The skill utilizes subprocesses for setup and operates a headless browser for inspection.
  • Sanitization: The script performs basic whitespace normalization and caps text length to 80 characters, but lacks logic to filter or neutralize adversarial instructions within the extracted text.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 2, 2026, 04:28 PM