browser-rendering
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The documentation recommends installing vitest and @cloudflare/vitest-pool-workers. While these are standard developer tools, they are external dependencies from a source not explicitly listed in the trusted organizations.
- [PROMPT_INJECTION] (LOW): The skill implements a browser automation surface susceptible to indirect prompt injection (Category 8). Evidence: 1. Ingestion points: The takeScreenshot and extractPageData functions in src/screenshot.ts ingest a url parameter for navigation. 2. Boundary markers: Absent; there are no delimiters or instructions to ignore embedded instructions within the rendered pages. 3. Capability inventory: The skill utilizes puppeteer.launch, page.goto, page.evaluate, and page.screenshot to interact with external web content. 4. Sanitization: No sanitization or validation of the input URL or the resulting page content is performed in the implementation.
Audit Metadata