shopping-admin-browser-automation
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- REMOTE_CODE_EXECUTION (CRITICAL): The skill implements a persistent browser server that executes arbitrary Python code provided over a Unix socket. Specifically,
scripts/browser_server.pyin theexecute_commandfunction (lines 115-132) useseval()andexec()on strings received from clients without any sanitization or sandboxing. - COMMAND_EXECUTION (CRITICAL): The script
scripts/run_browser_ops.py(lines 75-98) accepts arbitrary strings via the-ccommand-line argument and executes them usingeval()andexec(). This allows any user (or the AI agent itself if prompted maliciously) to run arbitrary system commands via Python'sosorsubprocessmodules. - CREDENTIALS_UNSAFE (HIGH): The
scripts/admin_login.pyutility requires administrative credentials (username and password) to be passed as plain-text command-line arguments. This practice exposes sensitive secrets to any user on the system who can view the process list (e.g., viapsortop) and may record passwords in shell history files. - INDIRECT_PROMPT_INJECTION (HIGH): The skill is designed to scrape and interact with external web content (Magento Admin panels). Because it lacks input sanitization and uses highly permissive execution tools (
eval/exec), it is vulnerable to indirect injection. An attacker could place malicious instructions inside a web page element (like a customer name or search term) which, when read by the agent viasnapshot()and passed to the execution scripts, would result in code execution. - SUSPICIOUS_MALICIOUS_URL (INFO): An automated scanner flagged
browser.se. Upon analysis, this appears to be a false positive caused by the scanner misinterpreting the Python methodbrowser.select_optionas a domain name.
Recommendations
- AI detected serious security threats
- Contains 1 malicious URL(s) - DO NOT USE
Audit Metadata