dotnet-uno-testing

Pass

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: SAFECREDENTIALS_UNSAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [CREDENTIALS_UNSAFE]: The skill's code examples contain hardcoded credentials, specifically a password string ('P@ssw0rd!'), within UI interaction tests. While intended for testing, this pattern involves hardcoded secrets.- [COMMAND_EXECUTION]: The UnoWasmFixture class uses System.Diagnostics.Process to execute the dotnet run command. This enables the skill to launch local processes and execute code on the host system to start the WASM server.- [EXTERNAL_DOWNLOADS]: The skill documentation and code references indicate dependencies on external components, including the Microsoft.Playwright library and the installation of browser binaries required for Playwright operations.- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes untrusted text from the application's user interface.
  • Ingestion points: Data is ingested from the browser DOM through methods like GetTextAsync, which retrieves text content from elements identified by automation IDs.
  • Boundary markers: No explicit delimiters or guardrail instructions are used when passing UI-derived text back to the agent context.
  • Capability inventory: The skill possesses the capability to execute shell commands (Process.Start) and perform network/browser-based operations via Playwright.
  • Sanitization: The skill does not implement sanitization or validation logic for the content retrieved from the UI before it is processed by the agent.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 5, 2026, 09:30 PM