agent-browser
Fail
Audited by Gen Agent Trust Hub on Mar 25, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill documents an installation procedure that involves piping a remote script directly into a shell context.
- Evidence:
curl -fsSL https://cli.inference.sh | shinSKILL.md. - Note: This script originates from the vendor's official domain.
- [COMMAND_EXECUTION]: The skill exposes a function that allows for the execution of arbitrary JavaScript code within the browser context.
- Evidence: The
executefunction documented inreferences/commands.mdandSKILL.mdallows users to provide and run custom JS strings. - [DATA_EXFILTRATION]: The documentation provides guidance and code snippets for extracting sensitive information from the browser context, such as cookies and performance resource entries.
- Evidence: The "Cookie Extraction" section in
references/authentication.mddemonstrates how to use theexecutefunction to retrievedocument.cookie. - [PROMPT_INJECTION]: The skill functions as a gateway to untrusted web content, presenting a surface for indirect prompt injection attacks.
- Ingestion points: Functions like
open,snapshot, andexecutereturn raw or structured content from arbitrary URLs (e.g.,elements_textinSKILL.mdanddocument.body.innerTextintemplates/capture-workflow.sh). - Boundary markers: There are no explicit boundary markers or instructions provided to the agent to treat the ingested web content as untrusted or to ignore embedded instructions.
- Capability inventory: The
infshtool provides extensive browser automation capabilities, which could be misdirected by injected instructions from a malicious website. - Sanitization: No sanitization, filtering, or validation of the content retrieved from external websites is performed before it is passed to the agent context.
Recommendations
- HIGH: Downloads and executes remote code from: https://cli.inference.sh - DO NOT USE without thorough review
Audit Metadata