agent-browser
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [Data Exposure & Exfiltration] (MEDIUM): The skill provides tools to extract sensitive session data.
- Evidence: Commands
agent-browser cookies,agent-browser storage local, andagent-browser state saveallow for the extraction and local persistence of authentication tokens and session secrets. - Evidence: The
agent-browser uploadcommand allows the agent to read files from the local filesystem and transmit them to external web servers. - [Dynamic Execution] (MEDIUM): The skill permits arbitrary code execution within the browser context.
- Evidence: The
agent-browser evalcommand enables the execution of arbitrary JavaScript, which can be used to manipulate page logic or exfiltrate data not accessible via the standard DOM. - [Indirect Prompt Injection] (LOW): High vulnerability to instructions embedded in web content.
- Ingestion points:
agent-browser snapshot,agent-browser get text, andagent-browser console(File: SKILL.md). - Boundary markers: Absent. The skill does not provide delimiters or instructions to treat scraped content as untrusted data.
- Capability inventory: High risk combination of file system access (
upload,state save), credential access (cookies), and dynamic execution (eval). - Sanitization: Absent. External web content is passed directly back to the agent's context.
Audit Metadata