testing-browser
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/with_server.pyscript usessubprocess.Popenwithshell=Trueto execute commands passed via the--cmdargument. This is used to manage development servers but allows for arbitrary command execution.\n- [PROMPT_INJECTION]: The skill has an indirect prompt injection surface. Scripts such asscripts/screenshot.py,scripts/snapshot.py, andscripts/verify.pyingest data from external URLs and output accessibility trees and console logs to the agent's context. There are no boundary markers or sanitization processes to prevent malicious content from the web pages from influencing agent behavior. Capabilities available for exploitation include command execution via the server management script.
Audit Metadata