browser-debugging
Pass
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: LOW
Full Analysis
- [Prompt Injection] (SAFE): The content consists entirely of educational instructions for browser debugging. No bypass markers, override instructions, or role-play injections were detected.
- [Data Exposure & Exfiltration] (SAFE): No hardcoded credentials, sensitive file paths, or network communication commands (e.g., curl, wget) are present.
- [Obfuscation] (SAFE): No Base64, zero-width characters, or homoglyphs were identified. All text and code snippets are human-readable.
- [Unverifiable Dependencies] (SAFE): The skill does not reference or install any external packages (npm, pip, etc.).
- [Remote Code Execution] (SAFE): No patterns for downloading and executing remote scripts were found.
- [Privilege Escalation & Persistence] (SAFE): The skill does not utilize sudo, modify system files, or attempt to establish persistence in the host environment.
- [Indirect Prompt Injection] (LOW): While the skill provides instructions for analyzing external data (browser console logs and HTML), it functions as a reference guide. It does not contain unsafe interpolation of untrusted data into privileged command execution environments.
- [Dynamic Execution] (SAFE): The provided JavaScript snippets are static examples for debugging and do not involve runtime compilation or unsafe deserialization.
Audit Metadata