performance-profiling
Pass
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- COMMAND_EXECUTION (SAFE): The script
scripts/lighthouse_audit.pyusessubprocess.runwith a list of arguments to invoke thelighthousebinary. This pattern is resistant to shell injection because it avoids shell interpretation of the input parameters. - EXTERNAL_DOWNLOADS (LOW): The skill depends on the
lighthouseCLI. As a widely recognized tool from a trusted organization (Google), the dependency risk is downgraded to LOW per the [TRUST-SCOPE-RULE]. - Indirect Prompt Injection (LOW): The skill ingests data from external URLs, creating a potential surface for indirect prompt injection.
- Ingestion points:
scripts/lighthouse_audit.pyfetches and parses content from user-provided URLs. - Boundary markers: Absent. The resulting audit data is passed to the agent without delimiters or specific instructions to treat the content as untrusted.
- Capability inventory: Access to
Bashand the ability to execute system commands viasubprocessinscripts/lighthouse_audit.py(line 25). - Sanitization: Absent. The script extracts scores and summaries from the external report without filtering for instruction-like patterns.
Audit Metadata