webapp-selenium-testing
Pass
Audited by Gen Agent Trust Hub on Apr 29, 2026
Risk Level: SAFE
Full Analysis
- [PROMPT_INJECTION]: The skill provides patterns for processing web content via Selenium, which introduces a surface for indirect prompt injection. This is effectively mitigated through provided best practices.
- Ingestion points: Data is ingested via the
driver.getPageSource()method in theBaseTest.javaexample found inreferences/page_object_model.md. - Boundary markers: The skill includes a dedicated 'Security Considerations' section in
SKILL.mdadvising users to only test their own applications and avoid navigating to third-party sites. - Capability inventory: The skill includes browser automation capabilities (
driver.get) and filesystem writes via a scaffolding script. - Sanitization: The provided implementation in
BaseTest.javaincludes a 50,000 character truncation limit for page source attachments to prevent excessively large or malicious payloads from entering the AI context. - [COMMAND_EXECUTION]: The PowerShell script
scripts/setup-maven-project.ps1is used to scaffold new Maven projects. It performs standard filesystem operations (New-Item,Set-Content) using hardcoded local templates and does not execute untrusted remote code. - [EXTERNAL_DOWNLOADS]: The Maven project templates (
scripts/pom-template.xml) utilize well-known, versioned dependencies from trusted organizations (SeleniumHQ, JUnit, AssertJ). These packages are resolved through official registries during the standard build process. - [SAFE]: The skill includes demo credentials (e.g., 'standard_user', 'secret_sauce') in its testing examples. These are standard placeholders for public testing sites and do not represent a security risk.
Audit Metadata