agent-browser
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- PROMPT_INJECTION (LOW): Indirect Prompt Injection vulnerability surface detected. The skill ingests data from external websites that could contain malicious instructions designed to influence the agent's behavior.
- Ingestion points:
agent-browser snapshotandagent-browser get textcommands intemplates/capture-workflow.sh,templates/form-automation.sh, andreferences/snapshot-refs.md. - Boundary markers: No specific delimiters or warnings used to isolate untrusted web content from the agent's instructions.
- Capability inventory: The skill possesses capabilities for form submission (
fill,click,select), cookie/session management (state save/load), and file system operations (screenshot,pdf,rm). - Sanitization: No evidence of sanitization or validation of the text/HTML extracted from target pages.
- CREDENTIALS_UNSAFE (LOW): Reference files and templates contain hardcoded placeholder credentials and patterns that encourage storing secrets in environment variables or configuration files.
- Evidence:
references/authentication.mdincludes hardcoded dummy credentials like"password123".references/proxy-support.mddemonstrates patterns for including credentials directly in proxy URLs. - SAFE (INFO): The documentation includes security best practices, such as using
.gitignoreto prevent session state files (which contain tokens) from being committed to version control.
Audit Metadata