electron
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides instructions to launch various desktop applications (Slack, VS Code, Discord, etc.) with the
--remote-debugging-portflag enabled (e.g.,open -a "Slack" --args --remote-debugging-port=9222inSKILL.md). This allows the agent to control the application and access its internal data via the Chrome DevTools Protocol. - [PROMPT_INJECTION]: The skill's primary function involves processing data from third-party applications, which constitutes an attack surface for indirect prompt injection.
- Ingestion points: The agent is instructed to capture snapshots and text from running Electron applications using
agent-browser snapshotandagent-browser get text(found inSKILL.md). - Boundary markers: The skill lacks instructions or delimiters to isolate untrusted data from the application from the agent's core system instructions.
- Capability inventory: The agent possesses capabilities to execute shell commands and interact with application UIs (click, type, fill) through the
agent-browsertool (found inSKILL.md). - Sanitization: There is no evidence of sanitization, filtering, or validation performed on the data retrieved from the target applications.
Audit Metadata