browser-trace
Pass
Audited by Gen Agent Trust Hub on Apr 30, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill scripts use Node.js
child_processmethods (spawn,spawnSync,execFileSync) to run local CLI tools such asbrowseandbb. These tools are used to capture browser data and manage sessions. Command arguments are handled without using a shell, which mitigates standard command injection risks.- [EXTERNAL_DOWNLOADS]: The documentation provides instructions for installing the@browserbasehq/browse-cliand@browserbasehq/clipackages from the official NPM registry. These are official tools required for the skill's primary functionality.- [CREDENTIALS_UNSAFE]: The skill uses theBROWSERBASE_API_KEYenvironment variable to authenticate with the Browserbase platform. This is a standard and recommended practice for secret management in developer tools.- [PROMPT_INJECTION]: The skill exhibits an inherent surface for indirect prompt injection (Category 8) because it captures raw data from arbitrary websites. - Ingestion points: Raw HTML and browser event logs are captured by
snapshot-loop.mjsandstart-capture.mjsinto the.o11y/directory. - Boundary markers: The captured data is bisected into structured JSON and JSONL files, providing separation between different types of events, though the content itself is untrusted.
- Capability inventory: The skill facilitates file system writes and the execution of browser-specific CLI tools.
- Sanitization: As a raw tracing tool, it does not perform sanitization on the captured browser content.
Audit Metadata