chrome-devtools
Warn
Audited by Gen Agent Trust Hub on Mar 7, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill executes multiple local Node.js scripts for browser automation tasks. The installation process includes
install-deps.sh, which utilizessudoto install necessary system libraries for Chrome on Linux-based systems. Additionally, the skill's documentation explicitly guides the agent to write and execute custom JavaScript files locally for complex automation workflows. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. It ingests untrusted data from external websites via ARIA snapshots (
aria-snapshot.js) and DOM snapshots (snapshot.js). These snapshots are processed by the agent without explicit boundary markers or sanitization, potentially allowing malicious website content (such as labels or hidden text) to influence the agent's logic or downstream actions. - [CREDENTIALS_UNSAFE]: The
inject-auth.jsscript accepts sensitive authentication tokens and cookies as command-line arguments. These credentials, along with browser session data, are saved to local files (.auth-session.jsonand.browser-session.json), creating a risk of credential exposure if the local file system is not strictly secured. - [EXTERNAL_DOWNLOADS]: The
install.shscript performs a standardnpm install, which downloads necessary Node.js dependencies from the well-known NPM registry. While these are trusted sources, they represent external code being introduced into the environment.
Audit Metadata