performance-profiling
Pass
Audited by Gen Agent Trust Hub on Feb 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/lighthouse_audit.pyusessubprocess.runto call the Lighthouse CLI. It passes arguments as a list, which is a secure practice that prevents shell injection by avoiding shell interpolation of the target URL. - [EXTERNAL_DOWNLOADS]: The skill documentation identifies a dependency on the
lighthouseCLI, which is a trusted, well-known auditing tool provided by Google. This dependency is documented neutrally as a functional requirement for automated audits. - [PROMPT_INJECTION]: The skill processes data from external URLs, creating a surface for indirect prompt injection where instructions hidden in a website's metadata could be ingested. However, this risk is inherent to the skill's primary purpose of auditing external sites and is handled as an operational reality rather than a malicious intent.
- [PROMPT_INJECTION]: Evidence Chain: 1. Ingestion points:
scripts/lighthouse_audit.pyfetches data from arbitrary URLs. 2. Boundary markers: Absent in the resulting JSON output. 3. Capability inventory: The skill usessubprocess.runfor execution and hasBashtool permissions. 4. Sanitization: No sanitization is performed on the content extracted from the external URL before being returned to the agent context.
Audit Metadata