skills/lautaroleonhardt/pst/pst-debug/Gen Agent Trust Hub

pst-debug

Pass

Audited by Gen Agent Trust Hub on Apr 8, 2026

Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
  • [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection surface because it processes untrusted data from the user. * Ingestion points: Ingests user-pasted test file paths, full error outputs, and test case documentation. * Boundary markers: Absent; there are no instructions to use delimiters or to ignore potential instructions embedded within the ingested test code or documentation. * Capability inventory: The skill has the capability to execute shell commands via npx and playwright-cli. * Sanitization: Absent; the skill does not explicitly validate or sanitize the content of the documentation or test files before processing.
  • [COMMAND_EXECUTION]: The skill constructs and executes shell commands using parameters provided by the user. * Evidence: The skill uses variables in commands such as 'npx playwright test [path]' and accesses file system paths like '.pst/sessions/[name]/'. * Risk: If the underlying platform does not sanitize these inputs, it could lead to command injection or path traversal if a user provides a malicious path or session name.
Audit Metadata
Risk Level
SAFE
Analyzed
Apr 8, 2026, 06:47 PM