automating-browser
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFEPROMPT_INJECTIONREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted data from external web pages and possesses powerful tools to act on that data.
- Ingestion points:
tabz/tabz_get_dom_tree,tabz/tabz_get_page_info,tabz/tabz_get_network_requests, andtabz/tabz_get_console_logs(documented in SKILL.md). - Boundary markers: The skill instructions do not specify any delimiters or safety warnings for handling embedded instructions within the ingested content.
- Capability inventory: Includes the ability to execute arbitrary JavaScript (
tabz_execute_script), simulate user interaction (tabz_click,tabz_fill), and download files to the system (tabz_download_file). - Sanitization: No evidence is provided that the browser output is sanitized or validated before being consumed by the agent.
- [REMOTE_CODE_EXECUTION]: The skill includes a tool,
tabz_execute_script, which allows the agent to run arbitrary JavaScript code within the browser session. While this is a standard feature for automation, it represents a dynamic code execution path. - [COMMAND_EXECUTION]: The skill operates by invoking
mcp-clito call various tools on the host system to perform browser management and interaction tasks.
Audit Metadata