webapp-testing
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/with_server.pyutilizessubprocess.Popenwithshell=Trueto execute commands passed as arguments. This provides a mechanism for arbitrary command execution on the host system. - [COMMAND_EXECUTION]: The skill encourages the agent to write and execute its own Python Playwright scripts, which constitutes dynamic code execution based on agent-generated logic.
- [PROMPT_INJECTION]: The skill exhibits a significant surface for indirect prompt injection as it processes untrusted data from web pages during testing.
- Ingestion points: HTML content and DOM elements are ingested using
page.content()andpage.locator().all()inexamples/element_discovery.pyandSKILL.md. - Boundary markers: No delimiters or safety instructions are provided to help the agent distinguish between application data and instructions.
- Capability inventory: The agent can execute shell commands through the
with_server.pyutility and perform file system operations. - Sanitization: There is no evidence of sanitization or filtering applied to the web content before it is analyzed by the agent.
Audit Metadata