webapp-testing
Pass
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill contains instructions that discourage the agent from reviewing source code before execution, which conflicts with standard safety protocols for verifying code behavior.
- Evidence:
SKILL.mdincludes the instruction: "DO NOT read the source until you try running the script first... They exist to be called directly as black-box scripts rather than ingested into your context window." - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface because it ingests and processes content from local web applications which could contain malicious instructions.
- Ingestion points:
SKILL.mdandexamples/element_discovery.pyuse functions likepage.content(),button.inner_text(), andlink.inner_text()to read data from the DOM. - Boundary markers: There are no boundary markers or delimiters defined to separate untrusted web content from the agent's instructions.
- Capability inventory: The skill possesses command execution capabilities through
scripts/with_server.pywhich uses thesubprocessmodule. - Sanitization: No sanitization or filtering logic is present to validate content retrieved from the browser before the agent processes it.
- [COMMAND_EXECUTION]: The skill is designed to execute shell commands to manage development servers and run Python automation scripts.
- Evidence:
scripts/with_server.pyutilizessubprocess.Popen(..., shell=True)to launch server commands andsubprocess.run()to execute the main automation task.
Audit Metadata