pw
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- Unverifiable Dependencies & Remote Code Execution (HIGH): The
page.evaloperation (documented inSKILL.mdandreferences/page.md) allows for the execution of arbitrary JavaScript within the browser context. This is a high-risk capability that can be exploited if the agent evaluates content derived from untrusted web pages.\n- Data Exposure & Exfiltration (HIGH): The skill includes operations such asauth.cookiesandauth.show(inreferences/auth.md) that explicitly retrieve and display browser session cookies and authentication metadata. This presents a direct path for sensitive credential exfiltration. Additionally, the skill automatically injects credentials from./playwright/auth/*.json.\n- Persistence Mechanisms (HIGH): Thescripts/start-daemon.shscript launches a persistentpwdaemon usingnohupanddisown. This allows the browser control infrastructure to remain active in the background, potentially facilitating long-term unauthorized access or monitoring.\n- Indirect Prompt Injection (LOW): The skill is designed to ingest large amounts of untrusted data from the web via operations likepage.text,page.html, andpage.read(inreferences/page.md).\n - Ingestion points: untrusted web content is loaded into the agent's context through various page-reading operations.\n
- Boundary markers: None. There are no instructions to the agent to treat data from the browser as untrusted or to ignore embedded instructions.\n
- Capability inventory: The agent has access to powerful tools including JS execution (
page.eval), cookie extraction (auth.cookies), and background process management.\n - Sanitization: No evidence of sanitization, filtering, or validation of the content retrieved from web pages.
Recommendations
- AI detected serious security threats
Audit Metadata