competitive-analysis
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection (Category 8) because it ingests untrusted data from the internet.
- Ingestion points: Competitor websites are scraped via Playwright's snapshot tool in the sub-agent instructions.
- Boundary markers: Absent. There are no delimiters or instructions to ignore malicious commands embedded in the scraped HTML or text content.
- Capability inventory: The main agent has access to
Bash,Write, andAgenttools, while sub-agents have the ability to write JSON reports to the file system. - Sanitization: No sanitization or validation is applied to the content retrieved from external sites before it is passed to the LLM for extraction.
- [COMMAND_EXECUTION]: The skill uses the
Bashtool to execute several local Python scripts for data merging, CSV-to-XLSX conversion, diff calculation, and summary generation. - [EXTERNAL_DOWNLOADS]: The skill's execution algorithm includes a step to install the Playwright MCP tool using
npx @playwright/mcp@latestfrom the public npm registry if the tool is missing. While this targets a well-known service, it involves executing third-party code at runtime.
Audit Metadata