web-screenshot
Fail
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The script
screenshot.jsattempts to execute system-level installation commands with implied elevated privileges. - Evidence: If a Chrome binary is not found, the code executes
apt-get update && apt-get install -y chromiumusingexecSyncto modify the host system. - [COMMAND_EXECUTION]: The script uses shell-interactive functions to execute binaries with arguments derived from user input.
- Evidence: The user-provided
urlandoutputFileparameters are passed directly as arguments to the Chrome process viachild_process.spawnandexecSync. - [DATA_EXFILTRATION]: The skill is vulnerable to local file disclosure (LFD) due to a lack of URL validation.
- Evidence: Headless Chrome can be directed to access local system files using the
file://protocol (e.g.,file:///etc/passwd), enabling an attacker to capture screenshots of sensitive data. - [DATA_EXFILTRATION]: The script allows the user to specify arbitrary output file paths, creating a risk of unauthorized file writes or overwrites.
- Evidence: The
outputFileargument is used infs.renameSyncwithout path sanitization, which could allow the tool to overwrite critical system or configuration files if the agent has sufficient filesystem permissions.
Recommendations
- AI detected serious security threats
Audit Metadata