dev-browser
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/start-server.tsfile usesexecSyncto execute shell commands likelsof,kill,netstat, andtaskkill. These commands are used to find and terminate processes running on specific network ports (9224 and 9225) to ensure a clean startup environment.- [EXTERNAL_DOWNLOADS]: The skill usesrebrowser-playwright, an unofficial fork of the Playwright library designed to bypass bot detection mechanisms. This introduces a supply-chain risk as the dependency is not from the official vendor.- [EXTERNAL_DOWNLOADS]: Thescripts/start-server.tsfile automatically triggers browser binary downloads usingnpx playwright install chromiumif the required browser is not found locally.- [REMOTE_CODE_EXECUTION]: The toolsbrowser_evaluate,browser_script, andbrowser_batch_actionsallow the agent to execute arbitrary JavaScript code within the context of a web page. While intended for automation, this allows the agent to run code that interacts with the browser's DOM and potentially external APIs.- [PROMPT_INJECTION]: The skill is highly vulnerable to Indirect Prompt Injection (Category 8). - Ingestion points: Untrusted data enters the agent context through
browser_snapshot,browser_get_text, andbrowser_evaluatewhich read content from external websites. - Boundary markers: There are no explicit boundary markers or instructions in the code to treat scraped content as untrusted data.
- Capability inventory: The skill has significant capabilities including process management via
execSyncand the ability to perform network requests from the browser. - Sanitization: There is no evidence of sanitization or filtering of the content retrieved from web pages before it is returned to the agent.
Audit Metadata