joomla-frontend-integration

Pass

Audited by Gen Agent Trust Hub on Mar 10, 2026

Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
  • [INDIRECT_PROMPT_INJECTION]: The skill demonstrates patterns that ingest external data into the agent's context, creating a vulnerability surface.
  • Ingestion points: references/06-sp-page-builder-addon-plugin.php (processes addon items from $addon->params->items) and references/02-modulo-testimonios-completo.php (processes testimonials from module parameters).
  • Boundary markers: Absent. There are no delimiters or explicit instructions for the agent to ignore instructions embedded in the processed data.
  • Capability inventory: The skill uses WebAssetManager to inject scripts and styles, and the PHP code generates HTML that is directly output to the page.
  • Sanitization: Sanitization is missing for the $description variable in references/06-sp-page-builder-addon-plugin.php, allowing unescaped content to be rendered.
  • [EXTERNAL_DOWNLOADS]: The skill fetches development assets from well-known technology companies and cloud services.
  • Evidence: References to code.jquery.com, jsdelivr.net (for Popper and Bootstrap), and analytics.google.com (for Google Analytics) in references/01-joomla-asset-json-avanzado.json.
  • Context: These are trusted sources for standard frontend libraries and do not involve untrusted remote code execution.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 10, 2026, 03:04 AM