api-test-supertest
Warn
Audited by Gen Agent Trust Hub on Apr 23, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The script
scripts/generate_supertest_tests.pydynamically assembles JavaScript test files by interpolating API endpoint paths and methods directly into string templates. Because these files are subsequently executed by the test runner, a maliciously crafted API definition containing JavaScript escape sequences could lead to arbitrary code execution in the local environment. - [COMMAND_EXECUTION]: The shell script
scripts/run.shautomates the generation and execution workflow, invoking Python scripts and runningnpm installandnpm teston generated content. - [EXTERNAL_DOWNLOADS]: The skill and its included CI templates (
github-actions-supertest.yml,Jenkinsfile.supertest) utilizenpm installto download dependencies from the public npm registry. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface by processing external data formats that influence agent-driven code generation. * Ingestion points:
scripts/parse_api_sources.pyingests various external formats including OpenAPI, Postman, and WSDL. * Boundary markers: There are no explicit delimiters or 'ignore' instructions provided to the code generation logic to distinguish data from instructions. * Capability inventory: The skill has the capability to write files to disk and execute them via shell commands inscripts/run.sh. * Sanitization: The_safe_namefunction inscripts/generate_supertest_tests.pyprovides regex-based sanitization for function names, but the API endpoint paths themselves are interpolated into the test logic without sufficient escaping.
Audit Metadata