agent-browser
Pass
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): Documentation in
examples/advanced/usage-with-agents.mdsuggests usingcurlto download skill configuration files from thevercel-labsGitHub repository. - Evidence:
curl -o .claude/skills/agent-browser/SKILL.md https://raw.githubusercontent.com/vercel-labs/agent-browser/main/skills/agent-browser/SKILL.md. - Assessment: Per [TRUST-SCOPE-RULE], this is downgraded to LOW/INFO as the source organization is in the trusted list.
- [COMMAND_EXECUTION] (MEDIUM): Integration templates and examples in
templates/ai-agent-workflow.mdandexamples/agent-mode/integration.mddemonstrate usingsubprocess.runwithshell=Trueand string interpolation. - Evidence:
subprocess.run(f"agent-browser {command} --json", shell=True, ...). - Risk: This pattern is vulnerable to command injection if an agent populates the
{command}variable with unvalidated input from a user. This is a common but unsafe pattern in CLI tool documentation. - [REMOTE_CODE_EXECUTION] (LOW): The skill documents the
agent-browser evalcommand, which allows arbitrary JavaScript to be executed within the browser's context. - Evidence:
agent-browser eval "document.title"inexamples/commands/advanced-commands.md. - Risk: While a core feature, it provides a high-privilege execution surface that could be abused if the agent visits malicious websites.
- [PROMPT_INJECTION] (LOW): As a browser automation skill, it is a target for Indirect Prompt Injection (Category 8).
- Ingestion points: Accessibility trees and page text ingested via
snapshotandget textcommands (found inapi/commands.md). - Boundary markers: The skill uses a structured JSON output format (
--json) which helps the agent distinguish tool output from data, but does not sanitize the semantic content of the page. - Capability inventory: Full browser control (navigation, input, clicks) and JavaScript evaluation (
eval). - Sanitization: No specific sanitization or filtering of external web content is described in the documentation.
Audit Metadata