paw-cra-agent-strategist
Warn
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The Python script
scripts/chrome-profile-discovery.pyis designed to locate browser profiles and verify the existence of sensitive authentication files such asCookiesandLogin Data. The documentation inreferences/browser-tools.mdalso instructs on saving session tokens in unencrypted plaintext JSON files within the project environment. - [COMMAND_EXECUTION]: Test scripts located in the
scripts/tests/directory usesubprocess.run()to execute Python commands and scripts using local file paths. - [EXTERNAL_DOWNLOADS]: The skill provides instructions for installing the third-party utility
agent-browservia package managers likenpmorbrewand initializing the browser research environment. - [PROMPT_INJECTION]: The skill includes an autonomous execution mode (
--headless) as described inSKILL.mdandreferences/autonomous-wake.md, which allows the agent to perform data collection and profile discovery without user interaction. - [DATA_EXFILTRATION]: The skill is designed to process content from authenticated web sessions and public searches, creating a surface for the exposure of private data and indirect prompt injection.
- Ingestion points: Data is retrieved from external websites and social media platforms through browser automation (see
references/content-research.md). - Boundary markers: No specific delimiters or 'ignore embedded instructions' warnings are implemented for the ingested web content.
- Capability inventory: The agent has access to file system writes and local command execution through provided scripts.
- Sanitization: The
scripts/research-synthesizer.pyscript performs basic truncation of input content but does not sanitize for malicious instructions or hidden characters.
Audit Metadata