chrome-cdp
Warn
Audited by Gen Agent Trust Hub on Mar 16, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The script uses
child_process.spawnto instantiate its own code as a background daemon process, ensuring persistent connectivity to browser tabs outside the primary execution thread.\n- [REMOTE_CODE_EXECUTION]: The skill providesevalandevalrawcommands that execute arbitrary JavaScript or raw protocol methods directly within the browser context, bypassing standard sandbox constraints.\n- [REMOTE_CODE_EXECUTION]: Commands such asclick,html, andloadalldynamically construct JavaScript strings at runtime for execution through the Chrome DevTools Protocol's evaluation functionality.\n- [DATA_EXFILTRATION]: The skill accesses sensitive browser artifacts including page HTML, accessibility tree snapshots, and viewport screenshots. It also reads the localDevToolsActivePortfile (e.g., in User Data directories) to obtain debugging session tokens.\n- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. 1. Ingestion points: accessibility snapshots (snap), HTML extraction (html), and JavaScript execution (eval). 2. Boundary markers: No delimiters or ignore-instructions warnings are present. 3. Capability inventory: Navigation, arbitrary JS execution, and file system writes (screenshots). 4. Sanitization: No filtering is performed on ingested web content before it enters the agent context.
Audit Metadata