wise-scraper
Warn
Audited by Gen Agent Trust Hub on Mar 24, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The hook registry in
references/runner/src/hooks.tsuses dynamicimport()to load and execute JavaScript modules from paths provided as command-line arguments. Additionally, the engine allows arbitrary JavaScript execution within the browser context via theagent-browser evalcommand. - [COMMAND_EXECUTION]: The reference runner and example scripts (such as
browser.tsandrun.mjs) usechild_process.execSyncand Python'ssubprocess.runto interact with theagent-browserCLI tool for browser driving. - [EXTERNAL_DOWNLOADS]: The skill instructs the installation of the
@anthropic-ai/agent-browserpackage, which is a tool from a trusted organization. It also includes several standard dependencies from the NPM registry such ascheerio,convict, andturndown. - [PROMPT_INJECTION]: The skill possesses an indirect prompt injection surface as it ingests data from external websites.
- Ingestion points: Web content scraped from arbitrary URLs via the
agent-browserrunner (referenced inengine.tsandrun.mjs). - Boundary markers: The skill employs structured JSONL format for intermediate data and explicitly separates the extraction process from post-processing assembly.
- Capability inventory: The runner can execute shell commands via
execSyncand load dynamic modules via the hook system. - Sanitization: The runner implements JavaScript-context escaping for browser evaluation but lacks robust sanitization for shell command interpolation of user-supplied selector strings.
Audit Metadata