skills/openclaw/skills/autofillin/Gen Agent Trust Hub

autofillin

Fail

Audited by Gen Agent Trust Hub on Feb 28, 2026

Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [REMOTE_CODE_EXECUTION]: The setup-env.sh script suggests the installation of the NVM utility via a piped bash command from a remote GitHub repository.
  • [COMMAND_EXECUTION]: The skill uses shell scripts to perform system operations, including process termination using pkill to manage browser instances and directory creation within the user's home folder.
  • [EXTERNAL_DOWNLOADS]: The skill initiates the download of Playwright and Chromium binaries through Node.js package managers as part of its environment setup.
  • [DATA_EXFILTRATION]: The skill accesses sensitive authentication sessions stored in ~/.playwright-auth.json and allows for the use of the primary user Chrome profile, which typically contains personal credentials, cookies, and browsing history.
  • [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection due to its interaction with untrusted web content. 1. Ingestion points: The skill reads page content and accessibility snapshots from target URLs using browser tools. 2. Boundary markers: There are no explicit markers or instructions to ignore commands that may be embedded in form fields or web page content. 3. Capability inventory: The skill possesses capabilities to fill forms, click elements, and execute JavaScript on the page via evaluate_script. 4. Sanitization: No sanitization or validation of external web content is evident before it is processed for automation tasks.
Recommendations
  • HIGH: Downloads and executes remote code from: https://raw.githubusercontent.com/nvm-sh/nvm/v0.39.0/install.sh - DO NOT USE without thorough review
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 28, 2026, 07:05 AM