build-component-ui

Warn

Audited by Gen Agent Trust Hub on Mar 9, 2026

Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The script schema-tester/component_schema_tester.py performs dynamic code loading by using importlib.util to import a Component class from a filesystem path provided in API requests. Additionally, playwright-setup/install.sh modifies the local Claude Desktop configuration file to register a new persistent tool server.
  • [REMOTE_CODE_EXECUTION]: The playwright-setup/install.sh script executes npx -y @executeautomation/mcp-playwright, which downloads and runs code from an unverified third-party NPM package.
  • [EXTERNAL_DOWNLOADS]: The schema-tester/component_schema_tester.py tool serves a web interface that fetches multiple dependencies including jQuery, Select2, and JSON Editor from cdn.jsdelivr.net. The playwright-setup/install.sh script also triggers browser binary downloads via npx.
  • [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface in schema-tester/component_schema_tester.py because it ingests untrusted JSON data via its API, which is then used to influence dynamic code execution on the local filesystem. This surface lacks explicit boundary markers or input sanitization.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 9, 2026, 11:55 PM