web-browser
Warn
Audited by Gen Agent Trust Hub on Mar 2, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
agent-browsertool includes anevalcommand capable of executing arbitrary JavaScript. This command supports Base64-encoded strings (agent-browser eval -b), which allows for the execution of code that is not immediately human-readable in its encoded form. - [REMOTE_CODE_EXECUTION]: The skill's configuration allows the execution of Node.js scripts (
node *) via theallowed-toolsdefinition. This provides the agent with the ability to run local scripts with the full capabilities of the Node.js runtime. - [COMMAND_EXECUTION]: The skill enables the use of
npx playwrightandnpx agent-browserfor browser automation. These tools are capable of complex interactions with both the local host and external networks. - [EXTERNAL_DOWNLOADS]: The skill fetches and executes the
agent-browserandplaywrightpackages using thenpxpackage runner. Playwright is a well-known industry tool, andagent-browseris a resource provided by the skill author. - [DATA_EXFILTRATION]: The skill provides features for managing sensitive authentication data, including the ability to save browser session state (containing cookies and tokens) to local files such as
auth-state.json. It also includes templates for using environment variables to handle login credentials. These files represent high-value targets if the system is compromised. - [DATA_EXFILTRATION]: The
agent-browsertool includes an--allow-file-accessflag which enables the browser to open local files viafile://URLs. This feature is intended for processing local HTML or PDF files but could be misused to access sensitive local data. - [PROMPT_INJECTION]: The skill has a significant attack surface for indirect prompt injection (Category 8). It retrieves and processes content from untrusted external websites and presents it to the agent. Content on these pages could be designed to influence the agent's behavior and abuse the powerful tools available to the skill.
- Ingestion points: Web content enters the agent context through
agent-browser snapshot,agent-browser get text, andnpx playwright screenshot. - Boundary markers: The skill does not implement specific delimiters or instructions to distinguish untrusted web content from its own instructions.
- Capability inventory: The agent has access to local script execution (
node), dynamic JavaScript evaluation (eval), and file system operations (session saving and local file access). - Sanitization: There is no evidence of validation or filtering of the content extracted from web pages before it is passed to the agent.
Audit Metadata