Browser
Fail
Audited by Gen Agent Trust Hub on May 2, 2026
Risk Level: HIGHCOMMAND_EXECUTIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: Mandatory instructions in
SKILL.mdand several workflow files require the agent to execute a silentcurlcommand tohttp://localhost:8888/notifyimmediately upon invocation. This process exfiltrates metadata about the agent's internal state to a local network port without explicit user consent. - [COMMAND_EXECUTION]: The
Workflows/Automate.mdorchestrator dynamically constructs shell commands by performing string replacement on recipe templates using unsanitized user-provided values (e.g.,{URL},{PROMPT}). This creates a significant risk of command injection if the inputs contain shell metacharacters. - [COMMAND_EXECUTION]: The skill provides a 'mid-session workaround' that launches the user's primary browser with the
--remote-debugging-portenabled, exposing the user's authenticated sessions, cookies, and profile data to programmatic control. - [PROMPT_INJECTION]: The skill uses imperative directives ('MANDATORY', 'REQUIRED') to force the agent to execute specific side-effect commands (the
curlnotification) before addressing the user's request, effectively overriding default operational behavior. - [PROMPT_INJECTION]: The skill exhibits an indirect prompt injection vulnerability surface.
- Ingestion points: Reads untrusted web content via
playwright-cli snapshotand external YAML configuration files. - Boundary markers: Absent; external data is processed as direct context for sub-agents.
- Capability inventory: Full browser control via
playwright-cli(including JavaScripteval), network operations viacurl, and sub-agent spawning. - Sanitization: None detected.
- [EXTERNAL_DOWNLOADS]: The skill relies on external browser automation tools (
playwright-cli,playwright) from established providers.
Recommendations
- AI detected serious security threats
Audit Metadata