x-composer
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes several system-level binaries using
execFileSyncincdp-launch.jsandcdp-type.js. This includes launching Google Chrome with theopencommand, managing the system clipboard viapbcopy, and performing GUI automation withosascript(AppleScript) to simulate keyboard shortcuts likeCmd+V. These commands allow for significant control over the host operating system. - [REMOTE_CODE_EXECUTION]: The
SKILL.mdinstructions utilize the Playwright MCPbrowser_run_codetool. This function allows for the execution of arbitrary, unverified JavaScript snippets within a browser session to interact with web elements, which bypasses standard script safety boundaries. - [EXTERNAL_DOWNLOADS]: The skill requires the external NPM package
chrome-remote-interfaceto be installed globally. This package is necessary for the skill to communicate with Chrome via the DevTools Protocol. - [PROMPT_INJECTION]: The skill is designed to process user-provided text for social media posts. Although the instructions explicitly forbid auto-posting and require manual confirmation, the automation pipeline remains an attack surface for indirect prompt injection if malicious input is crafted to manipulate the agent's browser automation steps.
- [DATA_EXFILTRATION]: The scripts create and access persistent data in the user's home directory, specifically
~/.chrome-cdp-profilefor browser sessions and~/.chrome-cdp-portfor port tracking. While intended for functional persistence, these locations contain sensitive browser state information.
Audit Metadata