chrome-devtools
Fail
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
scripts/screenshot.jsfile contains a command injection vulnerability in thecompressImageIfNeededfunction. The script usesexecSyncto invoke ImageMagick binaries and directly interpolates theargs.outputfilename into the shell command string. An attacker could provide a malicious filename (containing characters like"and;) that Puppeteer creates on the filesystem, which then causes arbitrary command execution when the compression utility is called. Evidence:compressionCmd = \${imageMagickBin} "${filePath}" -strip -resize 90% -quality 85 "${tempPath}"`. - [COMMAND_EXECUTION]: The
scripts/install-deps.shscript usessudoto install system packages on Linux distributions, which is a high-privilege operation. - [EXTERNAL_DOWNLOADS]: The skill downloads external software including
puppeteer(and its bundled Chromium binary) anddebugvia Node.js package managers, plus various system libraries via official OS repositories during setup. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection. 1. Ingestion points:
snapshot.js(DOM data) andscreenshot.js(visual content). 2. Boundary markers: Absent. 3. Capability inventory:scripts/screenshot.js(command execution), Puppeteer (navigation, interaction). 4. Sanitization: Absent; content from external websites is returned to the agent without filtering. - [COMMAND_EXECUTION]: The
scripts/lib/browser.jsfile configures Puppeteer with--no-sandboxand--disable-setuid-sandboxflags, which reduces the security isolation of the browser process.
Recommendations
- AI detected serious security threats
Audit Metadata