agent-browser
Pass
Audited by Gen Agent Trust Hub on Feb 26, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFE
Full Analysis
- [PROMPT_INJECTION]: Vulnerability to indirect prompt injection from untrusted websites.
- Ingestion points: Website content is retrieved and presented to the agent via commands like
open,snapshot, andget text(found in SKILL.md). - Boundary markers: No explicit markers are used to separate web content from system instructions.
- Capability inventory: The agent can execute high-impact interactions like clicking, filling forms, and running JavaScript (
eval), which could be maliciously triggered by instructions embedded on a website (found in references/commands.md). - Sanitization: Web content is processed and displayed to the agent without sanitization or filtering.
- [COMMAND_EXECUTION]: Arbitrary JavaScript execution within the browser environment.
- Evidence: The
evalcommand allows running arbitrary JavaScript code in the browser context, which can be used to manipulate the DOM or access browser-side data (documented in SKILL.md). - [EXTERNAL_DOWNLOADS]: Installation of browser binaries and automation dependencies.
- Evidence: The
installcommand downloads Chromium browser binaries from external sources (SKILL.md). - [CREDENTIALS_UNSAFE]: Unencrypted session storage and potential local file exposure.
- Evidence: The
state savecommand exports sensitive cookies and session tokens to unencrypted local JSON files (documented in references/session-management.md). - Evidence: The
--allow-file-accessflag allows the browser to read local system files, which could lead to data exposure if an attacker-controlled site is visited (documented in SKILL.md).
Audit Metadata