gemma-gem-browser-ai
Fail
Audited by Gen Agent Trust Hub on Apr 8, 2026
Risk Level: HIGHCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The
run_javascripttool implemented in the service worker (background/tools.ts) utilizesnew Function(args.code)to execute arbitrary JavaScript code provided by the AI model. This grants the model full programmatic control over the active browser tab's context. - [DATA_EXFILTRATION]: The skill possesses tools designed to harvest sensitive information, including
read_page_contentfor scraping text and HTML, andtake_screenshotfor capturing visual data from the browser. While the skill claims no cloud dependencies, these tools provide the necessary primitives for data collection that could be exfiltrated if the agent is compromised. - [REMOTE_CODE_EXECUTION]: The skill automatically downloads and executes large-scale AI models (~500MB to 1.5GB) from Hugging Face's infrastructure (
onnx-community/gemma-4-*) using the@huggingface/transformerslibrary. The execution of these external binary artifacts constitutes a remote code execution pathway. - [EXTERNAL_DOWNLOADS]: Fetches model weights and configuration files from Hugging Face's official repositories. These downloads are performed automatically during the first initialization of the chat interface.
- [PROMPT_INJECTION]: The skill is highly vulnerable to indirect prompt injection because it ingests untrusted content from web pages via the
read_page_contenttool and subsequently processes it through an agent loop with high-privilege capabilities like JavaScript execution and form filling. There are no evident sanitization or boundary markers to prevent malicious instructions on a webpage from hijacking the agent's session.
Recommendations
- AI detected serious security threats
Audit Metadata