using-webctl
Warn
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/setup_webctl.pyscript executes shell commands usingsubprocess.run(shell=True)to automate the installation of the webctl package and its browser dependencies.- [REMOTE_CODE_EXECUTION]: The setup script performs runtime modification of local files by patchingsession_manager.pywithin the webctl package and dynamically deployingauth_proxy.pyto the package directory for runtime loading.- [CREDENTIALS_UNSAFE]: Thescripts/auth_proxy.pycomponent implements a local proxy on127.0.0.1:18080that accesses and processes sensitive JWT credentials from theHTTP_PROXYenvironment variable.- [PROMPT_INJECTION]: The skill ingests untrusted data from the web usingwebctl snapshot, which could contain malicious instructions. 1. Ingestion point:webctl snapshotoutput inSKILL.md. 2. Boundary markers: None provided to separate untrusted content. 3. Capability inventory: Includes interaction tools likewebctl clickandwebctl type. 4. Sanitization: No content validation or sanitization is implemented.
Audit Metadata