webapp-testing
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The SKILL.md file contains explicit instructions ('DO NOT read the source until you try running the script first') designed to bypass the agent's security auditing processes and treat scripts as 'black boxes'.\n- COMMAND_EXECUTION (HIGH): The
scripts/with_server.pyutility usessubprocess.Popen(shell=True)to execute arbitrary strings provided via the--serverargument, which allows for unauthorized system command execution.\n- PROMPT_INJECTION (HIGH): The skill creates a high-risk attack surface for indirect prompt injection by ingesting untrusted content from web applications and using that data to drive high-privilege actions.\n - Ingestion points:
page.goto()andpage.content()inelement_discovery.pyandSKILL.md.\n - Boundary markers: None present.\n
- Capability inventory:
subprocess.Popen(shell=True)inwith_server.py, file system writes inconsole_logging.py, and interactive browser sessions.\n - Sanitization: None present.
Recommendations
- AI detected serious security threats
Audit Metadata