browser-devtools-cli
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFECOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute the
browser-devtools-clicommand-line tool, which allows the agent to interact with the local operating system and manage browser sessions and temporary files.\n- [REMOTE_CODE_EXECUTION]: The toolsrun js-in-browserandrun js-in-sandboxallow for the execution of arbitrary JavaScript. Althoughjs-in-sandboxexecutes within a Node.js VM, the ability to run arbitrary code remains a significant capability that could be abused if directed toward malicious scripts.\n- [DATA_EXFILTRATION]: The skill has the ability to extract large amounts of data from browser sessions, including page HTML, text, console logs, and full HTTP request and response headers/bodies. This represents a risk of exposing sensitive session data or PII if the agent navigates to untrusted locations.\n- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection attacks because it fetches and processes content from external websites. (1) Ingestion points: Data is ingested throughnavigation go-to,a11y take-aria-snapshot, andcontent get-as-text. (2) Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are used when processing external content. (3) Capability inventory: The skill can execute arbitrary JavaScript, fill forms, and mock network responses. (4) Sanitization: Whileget-as-htmlcan remove scripts, other extraction tools provide raw content from external sources.\n- [CREDENTIALS_UNSAFE]: The skill references the use of theFIGMA_ACCESS_TOKENenvironment variable for design comparison features. While no secrets are hardcoded, this sensitive credential in the environment could be a target for exfiltration through the tool's code execution capabilities.
Audit Metadata