web-browser
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/start.jsscript executes aggressive shell commands viaexecSyncto kill all running Chrome processes (killall 'Google Chrome') and create directories. - [DATA_EXFILTRATION]: While no external network exfiltration was found,
scripts/start.jscontains logic to copy the user's entire local Chrome profile (including sensitive data like cookies, history, and stored logins) from standard macOS paths to a skill-managed cache directory (~/.cache/scraping) usingrsyncwhen the--profileflag is used. - [COMMAND_EXECUTION]: The
scripts/eval.jsscript allows for the execution of arbitrary JavaScript within the browser's context via the Chrome DevTools Protocol (CDP). This is a powerful capability that could be abused if the agent receives malicious instructions from a website. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8).
- Ingestion points: Browsing arbitrary external websites via
scripts/nav.js. - Boundary markers: Absent. There are no delimiters or instructions to ignore embedded commands in the processed web content.
- Capability inventory: Full browser control (clicking, navigation), arbitrary JavaScript execution (
eval.js), screenshot capture (screenshot.js), and local logging of network and console activity (watch.js). - Sanitization: None. The automation scripts interact directly with the DOM and execute code without filtering or validation.
Audit Metadata