local-testing
Warn
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: Shell scripts for bot testing (e.g.,
test-discord-bot.sh,test-slack-bot.sh) are vulnerable to AppleScript injection because user-provided messages and channel names are interpolated directly intoosascriptcommands without proper escaping. - [COMMAND_EXECUTION]: The
electron-dev.shscript is vulnerable to environment variable injection via theCDP_PORTvariable, which is used to construct file paths and command arguments. - [EXTERNAL_DOWNLOADS]: Recommends installing the
agent-browserCLI tool from npm, Homebrew, or Cargo, and utilizesnpxto execute theelectron-vitedevelopment server. - [DATA_EXFILTRATION]: Accesses sensitive system interfaces including the macOS clipboard (via
pbpasteandosascript) and screen capture (viascreencapture) to monitor application state. - [PROMPT_INJECTION]: Susceptible to indirect prompt injection due to the ingestion of untrusted data from external web pages and third-party chat applications.
- Ingestion points: Ingests data from the browser DOM via
agent-browser snapshotand from application windows via clipboard capture. - Boundary markers: None identified; external content is processed without delimiters or warnings to ignore embedded instructions.
- Capability inventory: The skill can execute arbitrary JavaScript in browsers, manipulate GUI elements of native apps, and perform file system operations.
- Sanitization: No validation or sanitization is performed on content retrieved from external sources before it is used to drive agent actions.
Audit Metadata