chrome-automation
Fail
Audited by Gen Agent Trust Hub on Apr 1, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [CREDENTIALS_UNSAFE]: Hardcoded VNC password 'vnc123' is used in both
setup.shandstart-chrome-automation.shto configure the remote access server. - [COMMAND_EXECUTION]: The
start-chrome-automation.shscript configures the VNC server with-localhost no, exposing the desktop session and browser to the network with only a weak, hardcoded password for protection. - [COMMAND_EXECUTION]: The skill launches Google Chrome with the
--no-sandboxflag while running as root, which disables the browser's primary security isolation mechanism and increases the risk of system compromise from malicious web content. - [COMMAND_EXECUTION]: The
setup.shscript installs multiple system-level packages and modifies the system's binary search path by creating symlinks in/usr/local/bin. - [COMMAND_EXECUTION]: The
chrome-a11yandchrome-monitor.pyscripts utilize the AT-SPI2 accessibility bus to programmatically interact with UI elements, which can be used to bypass user confirmation dialogs or auto-click buttons.
Recommendations
- AI detected serious security threats
Audit Metadata