chrome-devtools-mcp
Pass
Audited by Gen Agent Trust Hub on Apr 27, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill utilizes
execute_scriptto perform DOM queries, detect layout issues, and simulate user interactions (hover, focus). This is the standard mechanism for browser-based automation.- [EXTERNAL_DOWNLOADS]: The documentation referencesnpx chrome-devtools-mcp@latestas the method for initializing the server. This fetches the package from the official NPM registry, a well-known service.- [SAFE]: External links point to official documentation atdeveloper.chrome.comand the official GitHub repositorygithub.com/ChromeDevTools/chrome-devtools-mcpfor troubleshooting.- [PROMPT_INJECTION]: The skill interacts with external web pages, creating a surface for indirect prompt injection. - Ingestion points: External web content is ingested via
take_snapshotandexecute_script(SKILL.md). - Boundary markers: The instructions do not define specific delimiters or guardrails for processing the untrusted content returned by the browser.
- Capability inventory: The agent has capabilities to execute JavaScript (
execute_script), navigate to any URL (navigate_page), and write to the local filesystem (take_screenshotwithpath) (SKILL.md). - Sanitization: There is no mention of sanitizing or escaping the data retrieved from web pages before processing.
Audit Metadata