webapp-testing
Warn
Audited by Gen Agent Trust Hub on Apr 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The helper script
scripts/with_server.pyusessubprocess.Popenwithshell=Trueto execute server commands provided via the--serverargument. This allows for the execution of arbitrary shell logic, including command chaining. - [COMMAND_EXECUTION]: The same script executes the main automation command using
subprocess.run. While this does not use a shell, the arguments are dynamically provided by the agent. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection.
- Ingestion points: The agent ingests data from external web pages and console logs in
examples/element_discovery.pyandexamples/console_logging.py. - Boundary markers: No explicit markers or instructions are provided to the agent to ignore or isolate instructions found within the scraped data.
- Capability inventory: The skill provides a mechanism for shell command execution through the
scripts/with_server.pyscript. - Sanitization: No sanitization or validation is performed on the content retrieved from web pages before it is used by the agent to determine subsequent steps.
Audit Metadata