ah-fix-dom-flash
Pass
Audited by Gen Agent Trust Hub on Mar 27, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it reads and processes untrusted data from external web pages.\n
- Ingestion points:
scripts/flash-detector.jsandscripts/lingering-fixed-elements.jscollecttextContent, data attributes, and CSS styles from elements on the page.\n - Boundary markers: There are no explicit delimiters or instructions to the agent to treat the collected DOM data as untrusted content.\n
- Capability inventory: The skill has access to the
chrome-devtools-clitoolset, allowing it to navigate the browser, evaluate scripts, and interact with page elements.\n - Sanitization: No sanitization or filtering is applied to the data collected from the page before it is presented to the agent.\n- [COMMAND_EXECUTION]: The skill uses dynamic execution to run its diagnostic logic within the browser context.\n
- Evidence: The procedure in
SKILL.mddirects the agent to usechrome-devtools evaluate_scriptto execute the contents of the localscripts/directory, such asflash-detector.jsandcollect-flash-results.js.
Audit Metadata