agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides an extensive set of tools via the
agent-browserCLI for controlling web browsers, including navigation, form filling, and UI interaction. - [REMOTE_CODE_EXECUTION]: The
evalcommand allows for the execution of arbitrary JavaScript code within the browser context. It specifically supports a--base64or-bflag for passing encoded scripts, which is intended to avoid shell escaping issues but can also obfuscate the code being executed. - [DATA_EXFILTRATION]: The skill can capture page content, screenshots, and PDFs. With the
--allow-file-accessflag, the tool can read local files from the filesystem usingfile://URLs, potentially exposing sensitive local data. - [CREDENTIALS_UNSAFE]: The
state saveandauth savecommands persist browser sessions, including cookies and local storage tokens, to the filesystem in JSON format. While the skill documentation advises against committing these files, they remain a source of sensitive data exposure on the host. - [PROMPT_INJECTION]: The tool is designed to process untrusted data from web pages, creating an attack surface for indirect prompt injection. The skill includes an optional
AGENT_BROWSER_CONTENT_BOUNDARIESfeature to help agents distinguish between tool-generated output and untrusted page content.
Audit Metadata