webapp-testing
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [Prompt Injection] (HIGH): The skill contains self-referential instructions in the code review checklist claiming 'Zero critical security issues verified' and 'No high-priority vulnerabilities found'. This is a deceptive attempt to influence the agent's safety judgment and bypass security auditing protocols.
- [Indirect Prompt Injection] (HIGH): The skill is designed to ingest untrusted data from web URLs and local code, which is then processed using high-privilege tools.
- Ingestion points: External URLs via the
playwright_runner.pyscript and local codebase analysis usingGlobandGrep. - Boundary markers: Absent. There are no delimiters or instructions provided to the agent to isolate or ignore embedded instructions within the data being tested or reviewed.
- Capability inventory: Full access to
Bash,Write,Edit, andpythonexecution. - Sanitization: Absent. There is no evidence of input validation or content filtering, allowing potentially malicious instructions in a web page or code file to trigger arbitrary command execution via the
Bashtool. - [Command Execution] (MEDIUM): The skill documentation encourages the use of the
Bashtool for running Python scripts on arbitrary URLs. Without strict input sanitization, this provides a direct path for command injection or remote execution if the URL or page content is crafted to exploit shell parsing. - [External Downloads] (LOW): The skill requires the installation of the
playwrightpackage and its browser binaries. Whileplaywrightis a trusted source, installing unversioned dependencies at runtime via an agent skill is a best-practice violation that could lead to supply chain risks.
Recommendations
- AI detected serious security threats
Audit Metadata