vercel-sandbox
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill's implementation for browser automation introduces an indirect prompt injection surface where untrusted data from processed websites could influence agent behavior.
- Ingestion points: The
urlanddataparameters in thescreenshotUrl,snapshotUrl, andfillAndSubmitFormfunctions. - Boundary markers: None are utilized in the prompt templates or command construction within the provided example code.
- Capability inventory: The skill uses
sandbox.runCommandto perform a wide range of browser interactions (open, click, fill, wait) and execute shell commands inside the microVM environment. - Sanitization: The patterns do not demonstrate sanitization or escaping of the input data before it is passed to the sandbox commands.
- [EXTERNAL_DOWNLOADS]: Downloads the
@vercel/sandboxpackage from the official NPM registry and installs Chromium system dependencies viadnfwithin the microVM. These resources are retrieved from well-known and trusted providers. - [COMMAND_EXECUTION]: Employs
sandbox.runCommandto execute setup and automation tasks (e.g.,dnf install,npm install,agent-browser) within an ephemeral and isolated Linux microVM.
Audit Metadata