puppeteer-automation
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill recommends installing
puppeteerand related packages vianpm. These are standard, reputable packages from the npm registry. - [COMMAND_EXECUTION] (LOW): The skill utilizes
puppeteer.launch, which spawns a browser subprocess. It includes the--no-sandboxflag; while common for headless environments (like Docker), it disables critical browser security isolation and should be used with caution. - [Indirect Prompt Injection] (LOW): The skill's primary purpose is web scraping (
page.goto,page.$eval). This creates a surface for Indirect Prompt Injection, where untrusted content from external websites could influence agent behavior. - Ingestion points:
page.goto(),page.$eval(), andpage.evaluate()methods inSKILL.md. - Boundary markers: None. The snippets do not demonstrate the use of delimiters or 'ignore' instructions for scraped content.
- Capability inventory: The skill can launch browser processes (
puppeteer.launch), execute arbitrary JavaScript in the page context (page.evaluate), and write files to the local system (page.screenshot,page.pdf). - Sanitization: No evidence of sanitization or validation of the scraped text before it is returned to the agent context.
Audit Metadata