dev-browser
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill uses
execSyncandexecto run system shell commands for process management (lsof,kill) and container operations (docker) withinserver.shandscripts/start-server.ts. - [EXTERNAL_DOWNLOADS] (HIGH): At runtime, the skill dynamically installs the
patchrightnpm package and Playwright browser binaries, and pulls the FlareSolverr Docker image. These external assets are not pinned to specific versions in the manifest. - [REMOTE_CODE_EXECUTION] (HIGH): The capability to execute arbitrary JavaScript in the browser via
page.evaluatewhile interacting with untrusted websites creates a direct vector for remote code execution. - [DATA_EXFILTRATION] (MEDIUM): Sensitive browser data, including cookies and session headers, are stored in local directories (
profiles/andtmp/), which could be targeted for exfiltration if the agent is compromised. - [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to indirect prompt injection (Category 8). It ingests untrusted web content (via
page.gotoand response listeners) without boundary markers or sanitization, while possessing high-privilege capabilities such as shell execution and file manipulation. Evidence: Ingestion points:page.goto,FlareSolverrClient.solveUrl, and network request/response listeners. Boundary markers: None present. Capability inventory: System command execution (execSync), file system access (fs.writeFileSync), and network operations (fetch). Sanitization: No sanitization of ingested content before processing.
Recommendations
- AI detected serious security threats
Audit Metadata