agent-browser
Pass
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill provides a CLI for browser automation, including an
evalcommand for executing JavaScript in the browser context. It supports Base64-encoded scripts (eval -b) to prevent shell character corruption during prompt interpolation. - [EXTERNAL_DOWNLOADS]: The skill utilizes
npxto execute theagent-browserutility, which involves fetching the package from the npm registry if not already present in the environment. - [PROMPT_INJECTION]: As the tool processes untrusted web content (via
snapshot,get text, andconsole), it is vulnerable to indirect prompt injection where malicious instructions on a webpage could influence the agent. The skill explicitly provides and recommends theAGENT_BROWSER_CONTENT_BOUNDARIESfeature to mitigate this risk by wrapping output in verifiable markers. - [COMMAND_EXECUTION]: Support for the
file://protocol allows the agent to read local files if the--allow-file-accessflag is explicitly enabled, creating a potential path for local data exposure if misused. - [DATA_EXFILTRATION]: The tool can save browser session states (including cookies and local storage) to JSON files. While these are plaintext by default, the skill documentation provides instructions for encrypting these files at rest using
AGENT_BROWSER_ENCRYPTION_KEY.
Audit Metadata