webapp-testing
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute commands passed via the--serverargument. This allows for arbitrary shell command execution and is vulnerable to injection if the agent processes malicious input. - [PROMPT_INJECTION]:
SKILL.mdcontains instructions that discourage the agent from inspecting the script source code, which could be used to hide malicious logic or bypass safety checks. - [REMOTE_CODE_EXECUTION]: Indirect Prompt Injection Surface: 1. Ingestion points:
examples/console_logging.py(console messages),examples/element_discovery.py(DOM elements), andpage.content()calls inSKILL.md. 2. Boundary markers: No delimiters or instructions to ignore embedded commands are present. 3. Capability inventory:scripts/with_server.pycan execute arbitrary shell commands viasubprocess, and Playwright can interact with local and remote network resources. 4. Sanitization: No sanitization is performed on data scraped from web pages before it is processed by the agent.
Audit Metadata