agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
evalcommand (SKILL.md) allows the execution of arbitrary JavaScript within the browser context, providing a mechanism for dynamic code execution that can bypass standard security constraints and access sensitive internal page data.\n- [DATA_EXFILTRATION]: The skill enables local file access through theopen file://protocol and theuploadcommand (SKILL.md). When combined with the browser's networking capabilities, this creates a significant risk for the unauthorized reading and exfiltration of sensitive local files if the agent is influenced by malicious instructions.\n- [COMMAND_EXECUTION]: The--executable-pathflag (SKILL.md) allows specifying an arbitrary local binary to be used as the browser, which could be exploited to execute malicious code on the host system if the agent is directed to use an unauthorized path.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it processes untrusted web content viasnapshotandget textcommands (SKILL.md). [Mandatory Evidence Chain]: Ingestion points are thesnapshotandget textcommands; Boundary markers are absent; Capability inventory includeseval,upload, andopencommands (SKILL.md); Sanitization is absent across all provided documentation and templates.\n- [CREDENTIALS_UNSAFE]: Thecookiesandstate savecommands (SKILL.md) enable the extraction and persistence of sensitive authentication tokens. These features represent a risk of credential exposure if the resulting session state files are stored or transmitted insecurely.
Audit Metadata