agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONREMOTE_CODE_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it instructs the agent to process content from untrusted external websites. Mandatory Evidence: 1. Ingestion points: Untrusted data enters the agent's context through
agent-browser openandsnapshotcommands (SKILL.md). 2. Boundary markers: There are no delimiters or explicit instructions to ignore embedded commands in retrieved content. 3. Capability inventory: The agent has access toagent-browsersubprocess calls (SKILL.md), arbitrary JavaScript execution viaeval(references/commands.md), local file access viafile://URLs (SKILL.md), and network operations. 4. Sanitization: No sanitization or filtering of web content is implemented.\n- [DATA_EXFILTRATION]: The skill includes functionality to access and export sensitive session data, such as cookies and local storage, using theagent-browser state savecommand (references/session-management.md). It also supports local file system access throughfile://URLs when the--allow-file-accessflag is enabled (SKILL.md).\n- [REMOTE_CODE_EXECUTION]: Theagent-browser evalcommand (references/commands.md) allows for the execution of arbitrary JavaScript within the browser context. The documentation highlights support for base64-encoded input (via the-bflag) and stdin, which are patterns for dynamic code execution that could be leveraged by an attacker if the agent is compromised.\n- [COMMAND_EXECUTION]: The skill exposes a powerful browser automation CLI tool (agent-browser) that enables a wide range of programmatic interactions with websites and the local environment through the Bash environment.
Audit Metadata