agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides an
evalcommand that enables the execution of arbitrary JavaScript within the browser context. This includes a--base64option for executing Base64-encoded strings, which could be used to obfuscate malicious scripts and bypass basic text-based detection. - [DATA_EXFILTRATION]: Use of the
--allow-file-accessflag with theopencommand allows the browser to navigate to and read local system files (e.g.,file:///etc/passwd). This presents a significant risk of sensitive data exposure if the agent is directed to access local paths. The skill also facilitates the extraction and saving of session cookies and localStorage data to disk. - [EXTERNAL_DOWNLOADS]: The skill instructions utilize
npxto dynamically download and execute theagent-browserpackage from the NPM registry at runtime. It also references the installation ofappiumfor mobile simulation tasks. - [COMMAND_EXECUTION]: The tool relies on shell command execution for its primary operations. Provided script templates (
authenticated-session.sh) are designed to process environment variables that may contain sensitive user credentials such asAPP_PASSWORD. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection when processing content from untrusted websites.
- Ingestion points: Data from the web enters the agent context via commands like
snapshotandget textafter navigating withagent-browser open(referenced inSKILL.mdandcapture-workflow.sh). - Boundary markers: The skill provides an opt-in security feature (
--content-boundaries) to wrap tool outputs in markers, helping the LLM distinguish between page content and instructions. - Capability inventory: The skill has extensive capabilities including arbitrary script execution (
eval), file downloads (download), and state management (state save). - Sanitization: No automatic sanitization of extracted web content is implemented; the skill relies on the optional boundary markers to manage untrusted input.
Audit Metadata