agent-browser
Pass
Audited by Gen Agent Trust Hub on Mar 6, 2026
Risk Level: SAFEREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADSDATA_EXFILTRATION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides an
evalcommand (agent-browser eval) which allows executing arbitrary JavaScript within the browser context. This is documented as a core feature for complex data extraction and page interaction. It supports execution via Base64 strings or stdin to ensure reliability against shell interpolation issues.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it retrieves and processes untrusted data from external websites.\n - Ingestion points: Website content is ingested via
snapshot,get text,screenshot, andpdfcommands across all script templates.\n - Boundary markers: The skill provides an optional
AGENT_BROWSER_CONTENT_BOUNDARIESfeature to wrap page-sourced output in markers to help the agent distinguish content from instructions.\n - Capability inventory: The tool possesses high-impact capabilities including
eval(JS execution),click,fill,upload, andnetwork route(interception).\n - Sanitization: The skill does not automatically sanitize or filter retrieved page content before presenting it to the agent.\n- [CREDENTIALS_UNSAFE]: The skill manages sensitive authentication data for web sessions. It includes an 'Auth Vault' (
agent-browser auth save) for encrypted credential storage and supports saving/loading session states (cookies, localStorage) to local JSON files. Documentation contains examples with placeholder credentials and environment variable usage for secrets.\n- [COMMAND_EXECUTION]: The skill operates by executing shell commands through theagent-browserCLI, allowing for broad programmatic control over the browser environment.\n- [EXTERNAL_DOWNLOADS]: The skill documentation suggests usingnpx agent-browser, which fetches the tool from the npm registry.\n- [DATA_EXFILTRATION]: The skill allows the agent to access the local filesystem via the--allow-file-accessflag andfile://URLs, enabling the reading of local files (e.g., PDFs, HTML) into the agent's context.
Audit Metadata