web-browser
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [Data Exposure & Exfiltration] (HIGH): The
tools/start.jsscript contains logic to copy the user's full Google Chrome profile (including sessions, cookies, and stored credentials) from~/Library/Application Support/Google/Chrome/to a cache directory usingrsync. This exposes highly sensitive data to the agent and any website it visits. - [Command Execution] (HIGH):
tools/start.jsutilizesexecSyncto perform shell operations such askillall,mkdir, andrsync. Executing shell commands with direct access to the filesystem is a high-risk pattern. - [Dynamic Execution] (MEDIUM):
tools/eval.jsusesnew AsyncFunctionto execute arbitrary string-based JavaScript within the browser context. While intended for automation, this allows a subverted agent or malicious website content to execute arbitrary code in the browser session. - [Indirect Prompt Injection] (LOW): As a web-browsing tool, this skill is vulnerable to instructions hidden in third-party web content. Malicious sites could attempt to hijack the agent's flow via the DOM data it processes.
- Ingestion points:
tools/pick.js(extracts text and outerHTML),tools/eval.js(reads DOM values). - Boundary markers: Absent; no delimiters or warnings are used to separate untrusted web content from instructions.
- Capability inventory: Browser navigation (
nav.js), arbitrary JS execution (eval.js), and simulated user interaction (pick.js). - Sanitization: Absent; the skill extracts and returns raw HTML/text from external pages.
Recommendations
- AI detected serious security threats
Audit Metadata