chrome-devtools
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
evaluate.jsscript uses theeval()function to execute arbitrary JavaScript code within the browser's page context, based on input provided through the--scriptparameter. - [CREDENTIALS_UNSAFE]: The
inject-auth.jsscript handles sensitive authentication data, such as session cookies and Bearer tokens. This information is persisted in a local file (.auth-session.json) to allow session reuse across different script executions. - [PROMPT_INJECTION]: The skill presents an indirect prompt injection surface. Ingestion points: Data is ingested from external websites via
aria-snapshot.js,snapshot.js,console.js, andnetwork.js. Boundary markers: The extracted content is returned as structured JSON but lacks specific delimiters or instructions to the LLM to ignore embedded commands. Capability inventory: The skill can perform active operations like clicking, form filling, and arbitrary JavaScript execution viaclick.js,fill.js, andevaluate.js. Sanitization: Whilelib/selector.jsincludes checks for XPath injection, there is no sanitization of the general page content retrieved from the browser. - [COMMAND_EXECUTION]: The
install-deps.shscript executessudo apt-get installcommands to install necessary system libraries for Chromium, which requires administrative privileges.
Audit Metadata