webapp-testing
Fail
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute arbitrary commands provided via the--serverargument. This allows for full shell access and command injection. - [PROMPT_INJECTION]: The file
SKILL.mdcontains explicit instructions directing the AI agent to "DO NOT read the source until you try running the script first" and to treat scripts as "black-box scripts." This is a social engineering tactic designed to bypass the agent's ability to perform security analysis on the underlying code before execution. - [COMMAND_EXECUTION]: The script
scripts/with_server.pyadditionally executes the trailing command arguments usingsubprocess.run, providing another vector for arbitrary code execution on the host system.
Recommendations
- AI detected serious security threats
Audit Metadata