webapp-testing
Pass
Audited by Gen Agent Trust Hub on Mar 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
subprocess.Popenwithin thewith_serverdecorator to programmatically start the local development server usingnpm run dev. This is a standard practice for automated testing workflows to ensure the target environment is active. - [PROMPT_INJECTION]: The skill facilitates the ingestion of content from the web application being tested, which introduces an attack surface for indirect prompt injection if the tested application contains untrusted data.
- Ingestion points: Page content, titles, and element text are read into the agent's context using methods like
page.content(),page.title(), and.text_content()inSKILL.md. - Boundary markers: The instructions do not define boundary markers or delimiters for separating the ingested web content from the agent's core instructions.
- Capability inventory: The skill possesses capabilities for command execution via
subprocess.Popen, file writing viapage.screenshot, and network navigation viapage.goto. - Sanitization: There are no explicit sanitization or validation steps for the data retrieved from the web application before it is processed by the agent.
Audit Metadata