debug-test
Pass
Audited by Gen Agent Trust Hub on Apr 7, 2026
Risk Level: SAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill executes shell commands including
curlandnpx playwrightusing placeholders like[BASE_URL]and[TEST_FILE_PATH]. These parameters are sourced from user input or project configuration files (project-context.md). If these files were to contain malicious shell metacharacters, it could lead to command injection. - [DATA_EXFILTRATION]: The skill triggers network requests using
curlto check application status. While intended for local development environments, this capability allows the agent to reach external domains if theBASE_URLconfiguration is modified to point to a remote server. - [PROMPT_INJECTION]: The skill processes untrusted data from "Full error output from the test run" and exploration reports. This creates a surface for indirect prompt injection where malicious instructions embedded in a test failure message could attempt to manipulate the agent's behavior.
- Ingestion points: Reads error output from test runs and exploration markdown files.
- Boundary markers: None provided in the instructions to separate data from commands.
- Capability inventory: Includes shell command execution (
curl,npx) and file system write access. - Sanitization: No validation or escaping of the ingested error output is performed before processing.
Audit Metadata