web-browse
Warn
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill invokes a local Node.js script located at a hardcoded path:
/Users/avifen/.agentsys/plugins/web-ctl/scripts/web-ctl.js. This allows the agent to execute shell commands to control a headless browser. - [DYNAMIC_EXECUTION]: The
evaluateaction allows for the execution of arbitrary JavaScript code within the context of the web page. This is a powerful capability that could be abused if the agent is influenced by malicious content to run scripts that exfiltrate session data or perform unauthorized actions. - [DATA_EXFILTRATION]: Multiple actions handle sensitive data or local file access:
- The
loginmacro accepts--userand--passarguments, creating a risk of credential exposure in logs or process histories. - The
file-uploadmacro allows the agent to upload files from the local filesystem (restricted to/tmp, working directory, orWEB_CTL_UPLOAD_DIR). - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection as it processes untrusted data from the web.
- Ingestion points: Web content is ingested via
goto,read,snapshot,extract, andpaginateactions. - Boundary markers: The skill uses
[PAGE_CONTENT: ...]delimiters and includes a 'CRITICAL: Prompt Injection Warning' section to instruct the agent to ignore instructions found within page content. - Capability inventory: The agent can perform significant actions based on page content, including clicking elements, filling forms, and executing JavaScript (
evaluate). - Sanitization: The skill relies on the LLM's adherence to instructions and the provided delimiters rather than hard technical sanitization of the web content.
Audit Metadata