websearch-service
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- Dynamic Execution (MEDIUM): The
browser_pool.pyfile configures the Playwright Chromium instances with--no-sandboxand--disable-web-securityflags.\n - Evidence: Lines 42-47 in
browser_pool.pyshow these flags being used during browser launch.\n - Risk: Disabling the sandbox allows malicious websites to potentially escape the browser process and execute code on the host system. Disabling web security bypasses the Same-Origin Policy, potentially allowing a site to access local resources or other domains.\n- Indirect Prompt Injection (LOW): The skill crawls arbitrary external URLs and passes the content to an LLM for analysis in
server.pyvia theanalyzer.searchmethod.\n - Ingestion points: Web content retrieved from URLs found via the SearXNG search engine (
server.py).\n - Boundary markers: None visible in the provided snippets (the
IntelligentSearchAnalyzerclass implementation inanalyzer.pyis missing from the provided files).\n - Capability inventory: The system uses Playwright for web navigation and an OpenAI-compatible client for content analysis (
server.py).\n - Sanitization: No sanitization or instruction-filtering logic is present in the provided filtering and scoring modules (
result_filter.py,url_scorer.py).\n- External Downloads (SAFE): TheDockerfiledownloads the Chromium browser and various Python packages during the build process.\n - Evidence:
RUN playwright install chromiumandRUN pip install ...in theDockerfile.\n - Risk: These downloads come from trusted sources (Microsoft and PyPI), making them safe under the [TRUST-SCOPE-RULE], but they are external dependencies.
Audit Metadata