chrome-devtools
Fail
Audited by Gen Agent Trust Hub on Feb 15, 2026
Risk Level: HIGHPROMPT_INJECTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- PROMPT_INJECTION (HIGH): The skill is highly vulnerable to Indirect Prompt Injection because it is designed to ingest and act upon data from untrusted external websites.
- Ingestion points: The tools
take_snapshot,list_network_requests, andlist_console_messagespull content directly from active web pages into the agent's context. - Boundary markers: Absent. There are no instructions to the agent to treat page content as untrusted or to use delimiters to separate instructions from data.
- Capability inventory: The skill possesses powerful capabilities including
evaluate_script(arbitrary JS execution),upload_file(filesystem interaction), and form-filling interactions. - Sanitization: Absent. There is no mention of sanitizing web data before using it to generate interaction logic or scripts.
- REMOTE_CODE_EXECUTION (HIGH): The
evaluate_scripttool allows for the execution of arbitrary code within the browser context. This is a primary target for attackers who can place malicious instructions on a webpage to trick the agent into running JS that steals credentials or performs cross-site actions. - DATA_EXFILTRATION (HIGH): Tools like
list_network_requestsandevaluate_scriptcan be used to extract sensitive session data, such as cookies, Bearer tokens, and local storage. This data can be exfiltrated by sending it to an external endpoint controlled by an attacker. - COMMAND_EXECUTION (MEDIUM): The browser automation tools (
click,fill,handle_dialog) allow the agent to perform actions on behalf of the user. If the browser is authenticated to internal or private services, a malicious prompt can result in unauthorized transactions or data modification.
Recommendations
- AI detected serious security threats
Audit Metadata