hackernews-frontpage
Pass
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests untrusted content from the Hacker News front page. An attacker could craft a story title or comment that, when processed by the agent, acts as a malicious instruction.\n
- Ingestion points: Content is fetched from
https://news.ycombinator.com/inscript.ts.\n - Boundary markers: Absent. Scraped data is placed directly into the JSON output structure without specific delimiters or instructions for the agent to treat it as untrusted.\n
- Capability inventory: The skill facilitates browser-based data retrieval via a local daemon.\n
- Sanitization: The skill performs standard HTML tag removal and entity decoding, but does not implement filtering for adversarial prompt content.\n- [COMMAND_EXECUTION]: The skill uses a subprocess to determine the project's root directory via the system's
gitcommand.\n - Evidence:
cp.spawnSync('git', ['rev-parse', '--show-toplevel'], ...)in_lib/browse-client.ts.\n- [DATA_EXFILTRATION]: The skill accesses a local configuration file to retrieve a daemon authentication token. While this is used for local communication, it involves reading from potentially sensitive file paths.\n - Evidence: Accesses
.gstack/browse.json(or the path specified by theBROWSE_STATE_FILEenvironment variable) in_lib/browse-client.ts.
Audit Metadata