robotframework-selenium-skill
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to interact with external web content which is untrusted by default.
- Ingestion points: Browser DOM content and page source via
Open Browser,Go To, andGet Source(found inSKILL.mdandreferences/waiting-strategies.md). - Boundary markers: None present. The agent processes page content directly without delimiters or safety instructions to ignore embedded commands.
- Capability inventory: Includes
Execute JavaScript,Click Element,Input Text,Capture Page Screenshot, andStart Process(referenced inreferences/screenshots-logs.md). - Sanitization: None present. Content from the web is processed and acted upon directly.
- [Command Execution] (HIGH): Multiple keywords allow for the execution of arbitrary commands or scripts.
- Evidence:
Execute JavaScript(inSKILL.md) allows running arbitrary code in the browser context.Start Process(inreferences/screenshots-logs.md) is used to invokeffmpeg, but could be repurposed to launch any system process. - [Dynamic Execution] (MEDIUM): The skill utilizes Python's
EvaluateandExecute JavaScriptto perform runtime operations. - Evidence:
references/waiting-strategies.mdusesEvaluateto callinput(), which can block or be exploited depending on environment isolation.references/screenshots-logs.mdusesEvaluatewithopen().read()to encode files to Base64, which could be exploited to read sensitive local files if the path is manipulated. - [External Downloads] (LOW): The skill documents the installation of standard, well-known libraries.
- Evidence:
pip install robotframework-seleniumlibraryandpip install webdriver-manager(inSKILL.md). These are trusted packages within the automation community.
Recommendations
- AI detected serious security threats
Audit Metadata