chrome-devtools
Warn
Audited by Gen Agent Trust Hub on Feb 23, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructions direct the installation of the
mcptoolsCLI from a third-party GitHub repository (github.com/f/mcptools) and execute thechrome-devtools-mcppackage viabunx -y. These resources are not from the trusted vendors list. - [COMMAND_EXECUTION]: Employs the
Bashtool to executepkillfor process termination andmcp shellfor command pipelining. - [REMOTE_CODE_EXECUTION]: Includes the
evaluate_scripttool, which executes arbitrary JavaScript within the browser context. This allows for runtime code execution against remote web content. - [PROMPT_INJECTION]: The skill possesses a broad attack surface for indirect prompt injection due to its ability to ingest and process untrusted external data.
- Ingestion points: Browser data is retrieved via
take_snapshotandlist_console_messagesinSKILL.md. - Boundary markers: There are no protective delimiters or instructions to ignore instructions embedded within the retrieved web data.
- Capability inventory: The agent has access to
Bash,evaluate_script, andWritetools, which could be exploited if malicious instructions are ingested. - Sanitization: No sanitization or validation of the data retrieved from the browser is mentioned or implemented.
Audit Metadata