skills/dvduongth/skills/agent-browser/Gen Agent Trust Hub

agent-browser

Pass

Audited by Gen Agent Trust Hub on Mar 5, 2026

Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
  • [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection, where malicious instructions embedded in untrusted web pages could be interpreted by the agent during automation or scraping tasks.\n
  • Ingestion points: Web page content retrieved via snapshot, get text, and screenshot --annotate in SKILL.md and references/snapshot-refs.md.\n
  • Boundary markers: The skill includes an optional AGENT_BROWSER_CONTENT_BOUNDARIES feature to help the agent distinguish between tool output and page content.\n
  • Capability inventory: Includes JavaScript execution (eval), file system interaction (download, upload), and local file access via file:// URLs.\n
  • Sanitization: No explicit sanitization of web content is performed before it is returned to the agent's context, relying on opt-in boundaries.\n- [DATA_EXFILTRATION]: The tool can access local files via the file:// protocol if the --allow-file-access flag is used (documented in SKILL.md). This capability could be exploited to read sensitive files from the host system if the agent is directed to malicious or unauthorized local paths.\n- [REMOTE_CODE_EXECUTION]: The eval command (documented in references/commands.md) allows the execution of arbitrary JavaScript within the browser context. While a core feature for automation, it represents a significant risk if the executed code is influenced by untrusted external data.\n- [COMMAND_EXECUTION]: The skill operates by executing agent-browser or npx agent-browser commands in a shell environment, granting the agent programmatic control over browser sessions.
Audit Metadata
Risk Level
SAFE
Analyzed
Mar 5, 2026, 09:04 AM