test-browser
Pass
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses several shell commands to determine the environment and test scope.
- Executes
git diffandgh pr viewto identify files modified in a branch or PR. - Uses
grepto scanpackage.json,CLAUDE.md, and.envfiles to automatically detect the local development server port. - Executes
command -v agent-browserto check for the presence of required tooling. - [EXTERNAL_DOWNLOADS]: The skill manages its own dependencies by installing external software.
- Installs the
agent-browserpackage globally usingnpm install -gif it is not detected on the system. - Runs
agent-browser installwhich downloads a headless Chromium binary (approximately 160MB) for browser automation. - [DATA_EXFILTRATION]: The skill reads local configuration and environment files (
.env,.env.local,.env.development). - While these files often contain secrets, the skill specifically greps for the
PORT=pattern to configure its testing URL, which is a common and legitimate practice for development tools. - [PROMPT_INJECTION]: The skill processes data from the application's UI via browser snapshots.
- Ingestion points: Reads content from local web routes (e.g.,
http://localhost:3000/users) and captures interactive element snapshots usingagent-browser snapshot -i(File:SKILL.md). - Boundary markers: None identified for browser-rendered content.
- Capability inventory: Can execute shell commands, install NPM packages, and perform browser interactions (click, fill, type) (File:
SKILL.md). - Sanitization: No explicit sanitization of UI content is performed before interaction. While this creates a surface for indirect prompt injection (where malicious instructions in the app UI could influence the agent), the risk is low and inherent to browser automation tasks.
Audit Metadata