chrome-devtools
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (MEDIUM): The
evaluate.jsscript allows execution of arbitrary JavaScript within the browser context viaeval(). While this is the intended functionality of the script, it poses a risk of dynamic code execution if the agent is directed to run untrusted logic. - COMMAND_EXECUTION (MEDIUM): The
install-deps.shscript utilizessudoto install system libraries on Linux (Ubuntu/Debian, Fedora, Arch). This involves elevated privileges for system configuration. - EXTERNAL_DOWNLOADS (LOW): The installation process (
install.shandinstall-deps.sh) downloads numerous third-party dependencies from standard package managers (npm, apt, dnf, pacman). These are generally from trusted sources but represent a large external dependency surface. - DATA_EXFILTRATION (LOW): Several scripts, including
screenshot.js,network.js, andsnapshot.js, have the capability to write data (images, network logs, DOM snapshots) to the local file system using user-provided paths via the--outputargument. - PROMPT_INJECTION (LOW): The skill acts as an ingestion point for untrusted external data from the web (via
snapshot.js,console.js, andnetwork.js). This creates a surface for indirect prompt injection where a malicious website could attempt to influence the agent's behavior through the scraped content. - Ingestion points:
navigate.js,snapshot.js,console.js,network.js(reads external URLs). - Boundary markers: None implemented to distinguish external web content from instructions.
- Capability inventory:
evaluate.js(exec/eval in browser),click.js/fill.js(interaction),network.js/screenshot.js(file writes). - Sanitization:
lib/selector.jscontainsvalidateXPathwhich checks for common injection keywords likejavascript:and<scriptin selectors.
Audit Metadata