jshook-reverse
Warn
Audited by Gen Agent Trust Hub on Mar 20, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill uses
new Function()to execute or parse snippets of JavaScript code collected from external websites. Specifically,PackerDeobfuscator.tsandJSVMPDeobfuscator.tsuse this method to decode Packer, AAEncode, JSFuck, and JJEncode patterns. If a target website provides a malicious payload that escapes the intended deobfuscation logic, it could execute arbitrary code on the user's host Node.js process. - [COMMAND_EXECUTION]: The skill provides the
page evalanddebug-evalcommands, which allow the AI agent to execute arbitrary JavaScript within the browser context using Puppeteer'spage.evaluateand the Chrome DevTools Protocol'sRuntime.evaluate. While intended for debugging, this is a powerful capability that can be misused if the agent is compromised via prompt injection. - [EXTERNAL_DOWNLOADS]: The
CodeCollector.tsmodule fetches JavaScript files from any user-provided URL. These files are then processed and sent to external LLM providers (OpenAI or Anthropic) for analysis. This creates a bridge between untrusted external content and the agent's reasoning process. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection. It ingests code from untrusted external URLs and passes it to LLMs for summarization and analysis without robust sanitization.
- Ingestion points:
CodeCollector.tsfetches scripts and inline code from the URL provided in thecollectcommand. - Boundary markers:
AISummarizer.tsandLLMService.tswrap the collected code in markdown triple-backticks (e.g.,```javascript), which provides a weak boundary that can be bypassed by malicious comments or strings in the analyzed code. - Capability inventory: The skill possesses dangerous capabilities including
PageController.ts(navigation, clicking, typing),DebuggerManager.ts(code evaluation), andHookManager.ts(script injection). - Sanitization: No sanitization or filtering of the collected code is performed before it is interpolated into the prompts for the LLM.
Audit Metadata