webapp-testing
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The utility script
scripts/with_server.pyusessubprocess.Popen(shell=True)andsubprocess.run()to execute commands provided via command-line arguments, which is a significant capability that could be exploited if inputs are not properly sanitized.- [PROMPT_INJECTION]: The skill has a large attack surface for indirect prompt injection. It is designed to ingest and process untrusted data from web applications throughpage.content(),page.locator().all()inexamples/element_discovery.py, andpage.on("console", ...)inexamples/console_logging.py. The absence of boundary markers or sanitization logic means malicious content on a tested site could attempt to manipulate the agent's behavior.- [COMMAND_EXECUTION]: TheSKILL.mdinstructions guide the agent to dynamically generate and execute native Python Playwright scripts at runtime, facilitating the execution of locally-created code.
Audit Metadata