testing-mastery
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script
scripts/test_runner.pyusessubprocess.runto execute testing frameworks such asnpm testandpytest. This allows the agent to run code defined in the local project environment. - [REMOTE_CODE_EXECUTION]:
scripts/test_runner.pydetects project types and triggers execution based on the presence ofpackage.jsonorpyproject.toml. This creates a vector for indirect code execution if an agent is directed to test a repository containing malicious test scripts or configurations. - [EXTERNAL_DOWNLOADS]:
scripts/playwright_runner.pyfacilitates network navigation to any user-provided URL for automated testing. Additionally, the skill utilizes well-known external dependencies and tools including Playwright, Pytest, Jest, and Vitest. - [PROMPT_INJECTION]: The skill contains an indirect prompt injection surface where untrusted data could influence agent behavior.
- Ingestion points:
scripts/test_runner.pyreads local configuration files (package.json,pyproject.toml), andscripts/playwright_runner.pyprocesses external URLs. - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are present in the scripts or documentation.
- Capability inventory: The skill possesses high-privilege capabilities including system command execution through
subprocessand network communication via Playwright. - Sanitization: There is no evidence of validation or sanitization of the input data from project files or external web content before processing.
Audit Metadata