agent-browser
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [COMMAND_EXECUTION] (HIGH): The skill provides an
evalcommand that allows the agent to execute arbitrary JavaScript within the browser context. - Evidence in
references/commands.mdandreferences/clickable-detection.mdshows usage ofeval --stdinandeval -b <base64>. - The
-b/--base64flag is explicitly recommended for 'reliable execution,' which can be used to obfuscate malicious scripts from simple keyword filters. - [DATA_EXFILTRATION] (HIGH): The tool supports the
file://protocol and has direct file-system interaction capabilities. references/commands.mdconfirms support forfile://,upload, andscreenshot --full, which could be used to read local files and capture sensitive data.- Combined with network capabilities, an attacker-controlled website could lead an agent to exfiltrate local configuration files or SSH keys.
- [PROMPT_INJECTION] (HIGH): Category 8: Indirect Prompt Injection. The skill is designed to ingest and interact with arbitrary external web content without any boundary markers or sanitization.
- Ingestion points:
agent-browser open "$TARGET_URL"intemplates/capture-workflow.shand others. - Boundary markers: None. No instructions are provided to the agent to ignore embedded instructions in the DOM.
- Capability inventory: Full interaction suite including
click,fill,eval, andstate save. - Sanitization: None. Data from the browser is passed directly to the agent's context via snapshots and text extraction.
- [CREDENTIALS_UNSAFE] (MEDIUM): The skill handles sensitive authentication tokens by saving browser state to local JSON files.
- Evidence in
templates/authenticated-session.shandreferences/session-management.mdshows session tokens/cookies are stored inauth-state.json. - While documentation suggests adding these to
.gitignore, the risk of accidental exposure or exfiltration via thefile://vulnerability is high. - [REMOTE_CODE_EXECUTION] (HIGH): Although not downloading binaries via
curl, theevalfunctionality over untrusted web content effectively allows for Remote Code Execution within the browser's security context, which can then be used to target the agent's session or host via shared resources.
Recommendations
- AI detected serious security threats
Audit Metadata