agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The
evalcommand inSKILL.mdandreferences/commands.mdallows the agent to execute arbitrary JavaScript within the browser context. The inclusion of a base64 flag (-b) allows for the execution of encoded scripts, which can be used to obfuscate malicious logic from logs or simple textual audits.- [DATA_EXFILTRATION]: The skill supports an--allow-file-accessflag as documented inSKILL.md. This permission enables the browser to open and read local system files usingfile://URLs. If an agent is coerced into opening sensitive files (e.g., SSH keys, configuration files), the content could be read and exfiltrated.- [CREDENTIALS_UNSAFE]: Thestate saveandauth savecommands inSKILL.mdandreferences/authentication.mdexport session cookies, local storage, and credentials to local files (e.g.,auth.json). While the skill mentions encryption, these files remain high-value targets for exfiltration and session hijacking.- [PROMPT_INJECTION]: The skill is highly vulnerable to indirect prompt injection (Category 8) because its primary function is to ingest and interact with untrusted third-party web content. - Ingestion points: Untrusted data enters the agent's context through
snapshot,get text, andget htmlcommands across all reference files. - Boundary markers: The skill provides an opt-in
AGENT_BROWSER_CONTENT_BOUNDARIESfeature to wrap output, but it is not enforced by default. - Capability inventory: The skill has broad capabilities including full network access, local file writing (
screenshot,pdf,state save), and arbitrary code execution (eval). - Sanitization: There is no evidence of automated sanitization or filtering of the content retrieved from web pages before it is processed by the agent.- [EXTERNAL_DOWNLOADS]: The
downloadcommand inSKILL.mdpermits the agent to download files from any URL to the local filesystem, which could be exploited to place malicious binaries or scripts on the host machine.
Audit Metadata