web-monitor-bot
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
setup-monitor.shscript andSKILL.mdinstructions modify the user's system crontab (crontab -l | crontab -) to achieve persistence and automate the bot's periodic execution. While aligned with the skill's purpose, this modifies system-level scheduling. - [EXTERNAL_DOWNLOADS]: The setup script executes
npm install, downloading packages from the public registry. Note thatbot-template.jsrequiresplaywright-extraandpuppeteer-extra-plugin-stealth, which are missing from the providedpackage.jsonfile. - [DATA_EXFILTRATION]: The
analytics-server.jsfile exposes the entire project directory viaexpress.static(__dirname). This allows anyone with access to the local web server (port 3002) to download sensitive files including.env(containing Slack webhooks) andsession-cookies.json(containing browser session cookies). - [PROMPT_INJECTION]: The skill exhibits a vulnerability surface for Indirect Prompt Injection (Cross-Site Scripting) within the analytics dashboard.
- Ingestion points:
bot.jsextracts content from external websites via Playwright. - Boundary markers: No sanitization or boundary markers are present to distinguish between monitored content and dashboard code.
- Capability inventory: The bot writes scraped data to
analytics.json, which is then served byanalytics-server.js. - Sanitization:
dashboard.htmlutilizes.innerHTMLto render activity logs fromanalytics.jsonwithout escaping. An attacker-controlled website could include malicious scripts that execute in the user's browser when they view the dashboard.
Audit Metadata