agent-browser

Fail

Audited by Snyk on Feb 21, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes examples and commands that pass passwords, proxy credentials, and other secret values as literal command-line arguments (e.g., agent-browser fill @e2 "password123", --proxy http://user:pass@proxy.com), which requires the LLM to handle or output secrets verbatim.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill explicitly navigates to arbitrary public URLs (see "agent-browser open " in SKILL.md) and then snapshots and extracts page content (e.g., "agent-browser snapshot -i", "agent-browser get text body" and templates/capture-workflow.sh and form-automation.sh) so the agent reads and acts on untrusted third-party webpage content that could contain instructions influencing subsequent actions.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 21, 2026, 12:18 AM