a0-browser-ext
Agent Zero Browser Extensions
Use this skill when the user wants to create a new Browser extension, modify an existing extension, or install a Chrome Web Store extension for Agent Zero's direct _browser plugin.
Operating Model
- Agent Zero loads Browser extensions from unpacked directories.
- Create user-owned extensions under
/a0/usr/browser-extensions/<extension-slug>/. - Browser extension paths must be visible inside the Docker runtime. Prefer
/a0/usr/browser-extensions/...paths over host-only paths. - The Browser puzzle menu can open "My Browser Extensions", seed a "+ Create New with A0" request, and install Chrome Web Store URLs.
- Chrome Web Store installs are converted into unpacked extension folders before Browser can load them.
- Extension setting changes restart active Browser runtimes so Playwright can relaunch Chromium with the extension arguments.
Safety First
Browser extensions run inside the Docker browser sandbox, but malicious or buggy extensions can still damage that sandboxed environment, corrupt browser profiles, exfiltrate page data visible to the Browser, or make browsing unreliable.
Before creating or installing an extension:
- State the requested behavior in one sentence.
- List the minimum permissions and host permissions needed.
- Avoid
<all_urls>unless the user explicitly needs broad page access. - Avoid remote code, eval-style execution, hidden credential collection, and broad network access.
- Do not store secrets in extension files.
- Prefer content scripts for page-local behavior and service workers for coordination.
- Tell the user when an extension can read or modify page content.
Create New Extension
- Ask for the extension name, user-visible purpose, target websites, and whether it needs a popup, content script, background service worker, options page, or side panel.
- Choose a lowercase slug such as
reader-highlighter. - Create
/a0/usr/browser-extensions/<slug>/manifest.json. - Add only the files the extension actually needs.
- Validate JSON syntax and confirm
manifest_versionis3. - Keep generated code small, readable, and easy for the user to audit.
- After creating the folder, tell the user to open Browser's puzzle menu, use "Browser Extension Settings", enable extensions, and include the new folder path if it is not already enabled.
Minimal Manifest V3 starter:
{
"manifest_version": 3,
"name": "Agent Zero Example Extension",
"version": "0.1.0",
"description": "Small, auditable Browser extension created with Agent Zero.",
"permissions": [],
"host_permissions": [],
"action": {
"default_title": "A0 Extension"
}
}
Content script starter:
{
"manifest_version": 3,
"name": "Agent Zero Page Helper",
"version": "0.1.0",
"description": "Adds a small page helper for specific sites.",
"permissions": [],
"host_permissions": ["https://example.com/*"],
"content_scripts": [
{
"matches": ["https://example.com/*"],
"js": ["content.js"],
"run_at": "document_idle"
}
]
}
Install From Chrome Web Store
If the user gives a Chrome Web Store URL or extension id:
- Confirm they understand the sandbox warning.
- Extract the 32-character extension id from the URL.
- Prefer the Browser puzzle menu's URL installer for direct installs.
- If installing manually, download the CRX from Chrome's update service, extract the ZIP payload safely, and place it under
/a0/usr/browser-extensions/chrome-web-store/<extension-id>/. - Inspect
manifest.jsonand summarize name, version, permissions, host permissions, and suspicious capabilities. - Enable only after the user accepts the risk.
Common URL shapes:
https://chromewebstore.google.com/detail/name/<extension-id>
https://chrome.google.com/webstore/detail/name/<extension-id>
<extension-id>
Review Checklist
manifest.jsonparses cleanly.- Every permission has a reason.
- Host matches are specific.
- No credential scraping, hidden data upload, or remote executable code.
- UI text is concise and tells the truth.
- The extension can be removed by deleting its folder from
/a0/usr/browser-extensions/and removing the path from Browser settings.
More from agent0ai/agent-zero
create-skill
Wizard for creating new Agent Zero skills. Guides users through creating well-structured SKILL.md files. Use when users want to create custom skills.
9a0-plugin-router
Main entry point for all Agent Zero plugin tasks. Routes to specialist skills for creating, reviewing, contributing, managing, or debugging plugins. Use when the user mentions plugins, asks how the plugin system works, wants to build/install/uninstall/publish/debug a plugin, or asks about the Plugin Hub.
5a0-development
Development guide for extending and building features for the Agent Zero AI framework. Covers architecture, tools, extensions, API endpoints, agent profiles, projects, prompts, and skills — with correct paths, imports, and patterns matching the current codebase.
5a0-debug-plugin
Diagnose and fix Agent Zero plugin problems. Covers plugin not appearing, won't enable, API endpoints not responding, frontend store errors, extension point injection, settings resolution, hooks.py issues, and log inspection. Use when a plugin is not working, not loading, crashing, missing from the list, or behaving unexpectedly.
5a0-setup-cli
Guide the user through installing and connecting the A0 CLI on the host machine so Dockerized Agent Zero can work on real local files. Use when asked to install A0, set up the CLI connector, connect Agent Zero to local files, or troubleshoot host-vs-container setup confusion.
4a0-review-plugin
Full audit of Agent Zero plugins in usr/plugins/. Reviews manifest validity, directory structure, code patterns (Store Gating, notifications, imports), security, and duplicate detection against the community index. Use when asked to review, audit, validate, or check an existing plugin before using or contributing it.
4