web-browser-review
Pass
Audited by Gen Agent Trust Hub on Mar 31, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill is designed to automatically execute developer scripts found within the project's
package.jsonfile (e.g.,npm run dev,npm start) to initialize the target environment. Running arbitrary scripts defined in a project carries a risk if the project source code is untrusted. - [PROMPT_INJECTION]: The skill exhibits an attack surface for indirect prompt injection. It ingests data from external, potentially untrusted sources—specifically the content of the web application being reviewed and a local
LESSONS.mdfile—to guide its actions. - Ingestion points: Web application content (retrieved via the
/browsetool) and theLESSONS.mdfile. - Boundary markers: Absent. There are no instructions or delimiters provided to help the agent distinguish between data to be reviewed and potential instructions embedded within that data.
- Capability inventory: The skill has significant capabilities, including
Bash(shell command execution) and the ability toRead,Write, andEditlocal project files. - Sanitization: Absent. The skill does not specify any validation or filtering of the content retrieved from the browser or lesson files before the agent uses it to determine and apply code fixes.
Audit Metadata