expect-test
Fail
Audited by Gen Agent Trust Hub on May 5, 2026
Risk Level: HIGHCREDENTIALS_UNSAFEDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: A hardcoded API key (
006dfde8d5037a1e366db2bb24e915d3) for theimgbb.comservice was found in the documentation providing implementation examples for uploading evidence. - [DATA_EXFILTRATION]: The skill provides logic to capture screenshots of the local development browser and upload them to a third-party service (
api.imgbb.com). This presents a high risk of exfiltrating sensitive information, such as PII or internal credentials, that might be visible in the user's UI during the testing process. - [EXTERNAL_DOWNLOADS]: The skill's setup instructions include a command to install the
expect-clipackage globally via the NPM registry (npm install -g expect-cli@latest). - [COMMAND_EXECUTION]: The skill executes multiple powerful shell commands to facilitate its testing workflow, including
tmuxfor session management,ffmpegfor processing video recordings,curlfor network data transfer, andgh(GitHub CLI) for interacting with repository releases and comments. - [PROMPT_INJECTION]: The skill has an indirect prompt injection surface as it consumes untrusted data from
git diffoutputs and live browser DOM content to generate and execute test plans. This could allow an attacker to embed instructions in source code or web pages to manipulate the agent's actions during the test cycle. - Ingestion points: Reads
git diffoutput and processes active browser content via Playwright. - Boundary markers: Absent from the provided implementation and instructions.
- Capability inventory: Execution of system commands (npm, tmux, ffmpeg, curl, gh) and browser automation capabilities.
- Sanitization: No validation or sanitization of the external content is implemented.
Recommendations
- AI detected serious security threats
Audit Metadata