chrome-devtools
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONCREDENTIALS_UNSAFEPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill provides various CLI scripts, such as
click.js,fill.js, andnavigate.js, which execute browser automation tasks via Puppeteer to interact with web elements. - [REMOTE_CODE_EXECUTION]: Includes an
evaluate.jsscript that allows the execution of arbitrary JavaScript within the browser context usingeval(). While this is a high-risk capability, it is the primary intended function for a browser development and automation tool. - [CREDENTIALS_UNSAFE]: Scripts like
inject-auth.jsandimport-cookies.jsmanage sensitive authentication data (cookies, tokens). This data is stored locally in.auth-session.jsonto enable session persistence across script executions without external exfiltration. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests data from untrusted external websites (via DOM snapshots, console monitoring, and network tracking). Malicious instructions hidden on a webpage could potentially influence the agent's logic.
- [EXTERNAL_DOWNLOADS]: The installation scripts (
install.sh,install-deps.sh) download necessary system libraries and official Node.js packages from established registries to support Puppeteer's execution environment.
Audit Metadata