browser-automation-agent

Fail

Audited by Snyk on Mar 1, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill's examples and instructions show inserting plaintext secrets (e.g., passwords) directly into agent-browser commands and JS execSync calls (e.g., agent-browser fill @e3 "password123"), which requires the LLM to include secret values verbatim in generated output.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's SKILL.md explicitly instructs the agent to open arbitrary URLs with "agent-browser open ", take snapshots, and extract page text/HTML (see "browser_open_and_snapshot" and "browser_capture" sections and the "Agent prompt"), so it ingests untrusted public web content that can influence subsequent interactions.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 1, 2026, 04:36 AM