browse
Fail
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill instructions include numerous shell commands using tools like
curl,lightpanda, andagent-browserfor web interaction and data processing. - [COMMAND_EXECUTION]: In the
references/tool-setup.mdfile, the workflow recommends usingsudoto move thelightpandabinary to/usr/local/bin/, which constitutes a privilege escalation risk. - [EXTERNAL_DOWNLOADS]: The skill directs users to download executable binaries from a non-trusted GitHub repository (
lightpanda-io/browser). Evidence found inreferences/tool-setup.md:curl -L -o lightpanda https://github.com/lightpanda-io/browser/releases/download/0.2.9/lightpanda-x86_64-linux. - [DATA_EXFILTRATION]: The skill provides instructions for extracting browser cookies via the
evaluatetool and using them withcurlto fetch protected resources. This capability, while functional for authenticated browsing, could be leveraged to exfiltrate session data to arbitrary domains. - [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection (Category 8) due to its core function of ingesting untrusted web data.
- Ingestion points: Web pages fetched via
WebFetch,Lightpanda, orPlaywrightas described inSKILL.mdandreferences/extraction-patterns.md. - Boundary markers: Absent. No specific delimiters or instructions to ignore embedded commands are mandated for processed content.
- Capability inventory: Significant local capabilities including shell access (
curl), file system writes (> extracted.md), and browser automation (click,fill,evaluate). - Sanitization: Absent. The skill does not mention escaping or sanitizing fetched content before presenting it to the agent context.
Recommendations
- AI detected serious security threats
Audit Metadata