qa-testing
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses
cmux_splitto execute shell commands such asnpm run devanddocker composeto start the application environment. It also usesnpxfor runninglighthouseandaxe-cliaudits. - [EXTERNAL_DOWNLOADS]: Fetches the
axe-coreaccessibility library fromcdnjs.cloudflare.com, which is a well-known and trusted content delivery network. - [REMOTE_CODE_EXECUTION]: Uses
npxto download and executeaxe-cliandlighthousefrom the npm registry, which is a standard package management service. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection as it ingests untrusted data from web applications. Ingestion points: Browser snapshots, DOM trees, console logs, and JavaScript error messages retrieved via
cmux_browser. Boundary markers: No explicit delimiters are used to wrap or sanitize content extracted from the web pages being tested. Capability inventory: The skill has access to shell execution (cmux_split) and arbitrary JavaScript execution in the browser (cmux_browsereval). Sanitization: No validation or filtering is applied to the content retrieved from external URLs before the agent processes it.
Audit Metadata