agent-browser
Warn
Audited by Gen Agent Trust Hub on Feb 28, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill includes an
evalcommand that allows the execution of arbitrary JavaScript in the browser context. The use of the--base64flag facilitates the execution of encoded scripts, which can be used to obfuscate malicious logic or bypass basic security filters. Standard shell execution of JavaScript is also supported viastdinor direct string arguments. - [DATA_EXFILTRATION]: The skill provides multiple methods for accessing and exporting potentially sensitive data. The
--allow-file-accessflag enables the browser to read local files viafile://URLs, which could lead to the exposure of sensitive system files if navigation is controlled by an attacker through indirect prompt injection. Additionally, thestate savecommand exports session cookies and local storage to JSON files; if these files are not handled securely, they could be used for session hijacking. - [EXTERNAL_DOWNLOADS]: The skill instructions frequently suggest using
npx agent-browser, which may download and execute code from the public NPM registry at runtime if the package is not already cached locally. - [COMMAND_EXECUTION]: The skill relies on executing the
agent-browserCLI tool, which manages a background browser daemon. This architecture involves persistent processes and potential interaction with the host's file system and network. - [PROMPT_INJECTION]: As the skill is designed to ingest and process content from arbitrary websites (e.g., via
snapshotorget text), it is susceptible to indirect prompt injection. Ingestion points:snapshotandget textcommands read data from external web pages. Capability inventory: The tool can perform complex actions includingclick,fill, andeval. Mitigation: The skill mentions an optional--content-boundariesfeature to help the agent distinguish between tool instructions and untrusted page content, though its use is not mandatory.
Audit Metadata