webapp-testing
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The helper script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute commands passed via the--serverargument. This allows for arbitrary shell command execution on the host system. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it processes untrusted data from external web pages and browser console logs. Ingestion points: The skill explicitly instructs reading page content via
page.content()(inSKILL.md) and capturing console messages (inexamples/console_logging.py). Boundary markers: No delimiters or instructions are used to distinguish untrusted web content from the agent's internal instructions. Capability inventory: The skill environment provides access to shell execution viasubprocess.runandsubprocess.Popenin the provided scripts. Sanitization: There is no evidence of sanitization, escaping, or filtering of the fetched content or logs before they are handled by the agent.
Audit Metadata