agent-browser
Warn
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- DATA_EXFILTRATION (HIGH): The skill provides the
--allow-file-accessflag and supports thefile:///protocol (documented inreferences/common-patterns.md), enabling the agent to read sensitive local files. Because the tool can also navigate to external URLs and submit form data, it creates a high-risk vector for exfiltrating host data to external servers. - COMMAND_EXECUTION (MEDIUM): The
evalcommand (including-b/--base64and--stdinmodes) allows for the execution of arbitrary JavaScript code within the browser context. This bypasses standard tool constraints and allows the agent to execute complex logic that could be manipulated by malicious web content. - PROMPT_INJECTION (LOW): This skill is highly vulnerable to Indirect Prompt Injection (Category 8).
- Ingestion points:
agent-browser snapshot,agent-browser get text, andagent-browser screenshot(seen inSKILL.mdandcapture-workflow.sh). - Boundary markers: None; the agent processes raw web content without delimiters or instruction-bypass protection.
- Capability inventory: Full browser control including
eval,fill, and navigation (documented incommands.md). - Sanitization: No evidence of sanitization or filtering of external web content.
- CREDENTIALS_UNSAFE (LOW): While the skill advises using environment variables, the
agent-browser state savecommand persists plain-text session tokens and cookies to the local filesystem (e.g.,auth-state.json), which could be exposed if the environment is not strictly isolated.
Audit Metadata