web-demo-video
Fail
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/record-scenes.tsdescribed inplaywright-recording.mdusesexecSyncto runffmpegwith a command line constructed using thescene.idvariable. This ID is part of the scenario JSON generated from user instructions. Without sanitization, a malicious prompt could inject arbitrary shell commands (e.g., by including characters like;or") into the execution context. - [DATA_EXFILTRATION]: The browser recording implementation in
playwright-recording.mdexecutespage.goto(action.url). Sinceaction.urlis derived from user input, an attacker can manipulate the agent into navigating to local system files using thefile://protocol or internal network endpoints. The resulting data would be recorded and stored in the video clips, facilitating data exfiltration. - [EXTERNAL_DOWNLOADS]: The skill instructions in
README.mdandSKILL.mdrely on downloading and installing numerous external dependencies and browser binaries from public registries vianpm,npx, andbunx(e.g.,playwright,remotion,chromium). - [REMOTE_CODE_EXECUTION]: The execution workflow involves running remote packages via
npxandbunxto handle video rendering and project initialization, which grants significant control over the local environment to external code providers. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its architecture. 1. Ingestion points: User-provided URLs and descriptions are directly used to generate a structured
scenario.jsonas seen inSKILL.md. 2. Boundary markers: No explicit boundaries or instructions to ignore embedded commands are present in the scenario generation process. 3. Capability inventory: The skill possesses high-privilege capabilities including shell command execution (execSync) and file system/network access via Playwright. 4. Sanitization: There is no evidence of validation or escaping for theurl,selector, oridfields before they are processed by sensitive system functions.
Recommendations
- AI detected serious security threats
Audit Metadata