agent-browser
Warn
Audited by Gen Agent Trust Hub on Apr 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONCREDENTIALS_UNSAFEREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill uses the Bash tool to execute subcommands of the
agent-browserCLI, granting the agent full control over a browser environment on the local system. - [CREDENTIALS_UNSAFE]: Includes explicit commands for handling sensitive authentication data, such as
set credentialsfor HTTP basic authentication, and commands to read/manipulatecookiesandstorage local(localStorage). - [CREDENTIALS_UNSAFE]: The documentation promotes a pattern of saving browser session states (including session tokens and cookies) to local JSON files (e.g.,
auth.json), which could lead to credential exposure if the filesystem is shared or compromised. - [REMOTE_CODE_EXECUTION]: The
evalcommand allows for the execution of arbitrary JavaScript code within the context of the currently loaded web page, which can be used to bypass UI-based data extraction or manipulate page logic. - [DATA_EXFILTRATION]: Provides multiple methods to extract data from web pages (
get text,get html,screenshot,pdf,record) which can then be saved to the local filesystem or potentially transmitted externally via theuploadoropencommands. - [EXTERNAL_DOWNLOADS]: The command reference documentation specifies the installation of an external global package
agent-browservia npm, which is required for the skill to function. - [PROMPT_INJECTION]: The skill exhibits a significant attack surface for indirect prompt injection as it is designed to ingest and act upon data from external, untrusted websites.
- Ingestion points: Raw web page content accessed via
snapshot,get text,get html, and browserconsolelogs. - Boundary markers: None identified. There are no instructions provided to the agent to treat website content as data or to ignore instructions embedded within the DOM.
- Capability inventory: The skill possesses powerful capabilities including filesystem writes (
screenshot,pdf,state save), network navigation (open,tab new), and dynamic execution (eval). - Sanitization: None identified. Data retrieved from the browser is passed directly into the agent's context without filtering or sanitization.
Audit Metadata