browser-automation-agent
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [COMMAND_EXECUTION]: The provided Node.js implementation snippets use
child_process.execSyncwith direct string interpolation (e.g.,execSync(agent-browser open ${url})). If theurl,formDatavalues, orsessionNameare derived from untrusted user input or scraped web content, an attacker could execute arbitrary shell commands on the host system. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
agent-browserpackage via NPM and triggers a secondary download of the Chromium browser binary usingagent-browser install. These external binaries execute with the permissions of the user. - [DATA_EXFILTRATION]: The skill includes explicit commands to retrieve sensitive information from the browser, such as
agent-browser cookies getandagent-browser storage get. This capability could be abused to exfiltrate session tokens or personal data if the agent is manipulated. - [INDIRECT_PROMPT_INJECTION]: The skill is designed to ingest and process content from arbitrary third-party websites.
- Ingestion points:
browser_open_and_snapshotandbrowser_capture(SKILL.md) read accessibility trees, HTML source, and page text. - Boundary markers: None. The agent prompt does not specify delimiters or instructions to ignore embedded commands within the scraped content.
- Capability inventory: Shell command execution via
execSync, file system writes viascreenshot/pdf, and network navigation via the browser CLI. - Sanitization: Absent. There is no evidence of filtering or escaping logic applied to the data retrieved from the browser before it is processed by the agent or passed back to the CLI.
Audit Metadata