agent-browser
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Indirect Prompt Injection] (HIGH): The skill is designed to ingest and process untrusted external data from web pages, creating a major attack surface for indirect prompt injection.
- Ingestion points: Commands like
snapshot,get text,get html, andconsoleread content directly from external websites into the agent's context. - Boundary markers: No boundary markers or instructions to ignore embedded commands are present in the skill definition.
- Capability inventory: The skill includes high-privilege commands such as
eval(arbitrary JS execution),cookies(session data access),upload(file handling), andnetwork route(traffic manipulation). - Sanitization: No evidence of sanitization or filtering of the ingested web content is provided.
- [Dynamic Execution] (HIGH): The
agent-browser evalcommand allows the agent to execute arbitrary JavaScript code within the browser context. An attacker-controlled website could provide malicious instructions that the agent then executes viaevalto steal data or perform unauthorized actions. - [Data Exposure & Exfiltration] (HIGH): Several commands provide direct access to sensitive information.
agent-browser cookiesandagent-browser storage localcan be used to extract session tokens and authentication data.agent-browser network requestsandset headerscan expose or inject sensitive authorization headers.agent-browser screenshotandpdfcan capture sensitive visual information from private pages.- [Privilege Escalation] (MEDIUM): While not OS-level, the
set credentialsandcookies setcommands allow for session hijacking or masquerading as the user on various web platforms.
Recommendations
- AI detected serious security threats
Audit Metadata