lightpanda-browser
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFECOMMAND_EXECUTION
Full Analysis
- [DYNAMIC_EXECUTION]: The script
scripts/run-cdp-task.jsutilizesrequire()to dynamically load and execute JavaScript task files provided via command-line arguments. This is the intended mechanism for running browser automation scripts within the skill's workflow. - [INDIRECT_PROMPT_INJECTION]: The skill interacts with external websites to extract content (Markdown, HTML, semantic trees), creating a surface where untrusted web data could contain instructions for the agent.
- Ingestion points: External URLs processed via
scripts/run-lightpanda.jsandscripts/run-cdp-task.js. - Boundary markers: The skill does not currently implement explicit delimiters or instructions to ignore embedded content within the rendered output.
- Capability inventory: The skill can spawn local processes, execute arbitrary JavaScript tasks, and write output files to the local file system.
- Sanitization: The skill returns raw or processed web content without applying additional sanitization filters prior to presentation to the agent.
- [COMMAND_EXECUTION]: External commands for the
lightpandabinary ordockerare executed usingchild_process.spawn. The implementation correctly usesshell: falseto mitigate risk from shell-based command injection.
Audit Metadata