live-debug
Fail
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [CREDENTIALS_UNSAFE]: The skill provides an explicit code example for retrieving authentication tokens from the browser via
window.localStorage.getItem('auth_token'). Instructing an agent to autonomously access and potentially expose session credentials represents a high risk for credential exposure and session hijacking.\n- [COMMAND_EXECUTION]: The skill uses thejavascript_toolto execute arbitrary JavaScript within the browser context. While intended for state inspection, this provides a vector for malicious interaction or data manipulation if the agent is influenced by malicious instructions or data.\n- [DATA_EXFILTRATION]: The skill enables broad data collection capabilities, includingread_network_requeststo monitor API traffic andcomputerfor capturing screenshots. Without strict constraints, these tools can be used to harvest PII or proprietary business data from the production environment athome.st44.no.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads untrusted data from an external website and possesses high-privilege interaction tools.\n - Ingestion points: The agent ingests data from the target site using
read_page,read_console_messages, andget_page_textas documented inSKILL.md.\n - Boundary markers: No delimiters or system-level instructions are present to prevent the agent from obeying commands embedded in the site's content or logs.\n
- Capability inventory: The agent has full browser interaction capabilities, including
computer(clicks, typing),javascript_tool(arbitrary JS execution), andnavigate(redirection).\n - Sanitization: There is no evidence of sanitization or validation of the data retrieved from
home.st44.nobefore it is processed by the LLM.
Recommendations
- AI detected serious security threats
Audit Metadata