chrome-devtools
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: CRITICALCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (CRITICAL): The
screenshot.jsscript is vulnerable to shell command injection via the--outputargument. User-provided file paths are directly interpolated into a shell command string for ImageMagick (magick "${filePath}" ...) and executed usingexecSync. An attacker could exploit this to run arbitrary system commands. Evidence: Found inscripts/screenshot.jsline 49 and line 155.\n- [REMOTE_CODE_EXECUTION] (HIGH): Theevaluate.jsscript allows the agent to execute arbitrary JavaScript code within the browser's page context usingeval(). This presents a high risk if the agent is tricked into executing malicious scripts on sensitive domains. Evidence: Found inscripts/evaluate.jsline 35.\n- [EXTERNAL_DOWNLOADS] (MEDIUM): Theinstall.shandinstall-deps.shscripts install numerous system dependencies and Node.js packages from external repositories, increasing the supply chain attack surface. Evidence:scripts/install-deps.shuses package managers (apt,dnf,pacman) andscripts/install.shexecutesnpm install.\n- [COMMAND_EXECUTION] (MEDIUM): The browser is launched with the--no-sandboxflag, which disables critical security protections in Chromium, making the host system more vulnerable to browser-based exploits. Evidence: Found inscripts/lib/browser.jsline 25.\n- [PROMPT_INJECTION] (HIGH): The skill is highly susceptible to Indirect Prompt Injection (Category 8). It ingests untrusted content from the web and possesses high-privilege capabilities including file writing and shell execution. Ingestion points:page.goto(args.url)innavigate.js,click.js,screenshot.js,evaluate.js,snapshot.js,console.js,network.js, andperformance.js. Boundary markers: Absent. Capability inventory: Shell command execution (viascreenshot.jsvulnerability), Browser JavaScript execution (evaluate.js), and arbitrary file system writes (network.js,snapshot.js). Sanitization: Absent. The blacklist-based validation inscripts/lib/selector.jsfor XPath is insufficient to prevent sophisticated injection attacks.
Recommendations
- AI detected serious security threats
Audit Metadata