data-base
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The workflow defined in
SKILL.mdexplicitly executes a generated Python script (your_script.py) using a virtual environment created at runtime. This allows for the execution of any logic the agent writes, which could be exploited via prompt injection to run malicious system-level code. - [COMMAND_EXECUTION] (HIGH): The skill utilizes
chrome_evaluateandpage.evaluate(via Playwright and MCP) to execute arbitrary JavaScript within a browser context. This capability can be leveraged to interact with authenticated sessions, perform unauthorized actions on websites, or exfiltrate browser data if the agent is misdirected. - [INDIRECT_PROMPT_INJECTION] (HIGH): The core purpose of this skill (web scraping) involves ingesting untrusted external data. Per the analysis framework, the combination of external content ingestion and the capability to execute commands or write files creates a high-risk surface. There are no boundary markers or sanitization protocols defined in
SKILL.mdortemplates.mdto prevent instructions hidden in scraped HTML from influencing subsequent agent actions. - [EXTERNAL_DOWNLOADS] (MEDIUM): The
setup.shscript automatically installs Python dependencies fromrequirements.txtand executesplaywright install chromiumto fetch external binaries. While the listed packages are standard, the automated execution of installation scripts for remote binaries is a significant attack vector if the package list or download sources were compromised.
Recommendations
- AI detected serious security threats
Audit Metadata