webapp-testing
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (MEDIUM): The script
scripts/with_server.pyusessubprocess.Popen(..., shell=True)to execute the string provided via the--serverargument. This pattern is susceptible to shell injection if the agent interpolates untrusted user input into the command string. - [PROMPT_INJECTION] (LOW):
SKILL.mdcontains instructions (e.g., 'DO NOT read the source until you try running the script first') that discourage the agent from performing security audits or understanding the logic of the scripts it executes, which could be leveraged to hide malicious behavior. - [INDIRECT_PROMPT_INJECTION] (LOW): The skill possesses a high-risk capability/ingestion chain.
- Ingestion points:
examples/element_discovery.pyreadsinner_text()from web elements;examples/console_logging.pycaptures arbitrary browser console logs. - Boundary markers: None. The script output is printed directly into the agent's context.
- Capability inventory: The skill allows arbitrary shell command execution via
scripts/with_server.pyand browser interactions (click, fill) via Playwright. - Sanitization: None. Data from external web pages is processed as raw text.
Audit Metadata