qa-electron
Pass
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: SAFE
Full Analysis
- [INDIRECT_PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection by ingesting untrusted data from the application under test.
- Ingestion points: The skill reads application log files (SKILL.md Phase 0), DOM snapshots via
playwright-cli snapshot, and renderer console output. - Boundary markers: Absent. The instructions do not define delimiters or specific 'ignore' instructions for the data read from the tested application.
- Capability inventory: The skill uses the
Bashtool to execute arbitrary commands, including file system operations and network connectivity checks. - Sanitization: Absent. Data from external logs or the application's DOM is not explicitly sanitized before being processed by the agent.
- [COMMAND_EXECUTION]: The skill instructions include numerous shell commands for environment setup, application control, and state verification (e.g.,
osascript,pnpm,sqlite3,jq,tail). These are legitimate within the context of a desktop application QA workflow. - [DYNAMIC_EXECUTION]: The skill utilizes
playwright-cli evalto execute JavaScript within the Electron renderer process. This is a core feature used for inspecting application state and security configurations (e.g., checkingnodeIntegration). - [PRIVILEGE_ESCALATION]: The skill mentions the use of
sudofor the macOSlog streamcommand but provides explicit guidance to skip this step if it prompts for credentials, minimizing the risk of unauthorized privilege acquisition.
Audit Metadata