goose-graphics
Pass
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill requires the Playwright library and its Chromium browser binary to function. These components are downloaded from official npm and Microsoft registries as part of the documented setup process.
- [COMMAND_EXECUTION]: To initialize the screenshot tool, the skill instructs the agent to run
npm installandnpx playwright install chromium. These are standard administrative tasks for configuring the rendering environment. - [REMOTE_CODE_EXECUTION]: The skill is distributed and installed via the
npx goose-skillsutility. This installation method involves executing code fetched from a remote package registry, which is the intended mechanism for the Agent Skills ecosystem. - [PROMPT_INJECTION]: The skill ingests untrusted data from external sources, creating a potential surface for indirect prompt injection.
- Ingestion points:
screenshot/fetch-tweet.jsfetches content fromx.comandcdn.syndication.twimg.comto be rendered in social proof graphics. - Boundary markers: The HTML templates generated for graphics do not use specific delimiters for external content injection.
- Capability inventory:
screenshot/screenshot.jsuses Playwright to render local HTML files, which could potentially execute scripts if the content is not properly escaped. - Sanitization: The ingestion script
fetch-tweet.jsuses the.innerTextDOM property, which ensures that only the text content of the source is extracted, preventing the inclusion of malicious HTML or script tags from the source platform.
Audit Metadata