webapp-testing
Pass
Audited by Gen Agent Trust Hub on Apr 4, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTIONNO_CODE
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes a helper script (
scripts/with_server.py) that accepts and executes arbitrary shell commands provided via the--serverflag. This is an intended feature for managing local development servers during the testing lifecycle. Notably, the instructions discourage the agent from reading the script's source code before execution to save context space, which reduces pre-execution auditing. - [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted content from web applications through methods like
page.content()and log inspection. This represents a potential surface for indirect prompt injection where a malicious site could attempt to influence the agent's actions. - Ingestion points: Ingests HTML content via
page.content()and captures console logs as described inSKILL.md. - Boundary markers: No explicit boundary markers or instructions to ignore embedded content are provided in the instructions.
- Capability inventory: The skill can execute shell commands via the server helper and perform file writes for screenshots.
- Sanitization: No evidence of input sanitization or validation of the ingested web content is present.
- [NO_CODE]: The analysis is performed on the
SKILL.mdfile only. The actual implementation ofscripts/with_server.pyand the example scripts mentioned in the documentation were not provided for security verification.
Audit Metadata