chrome-devtools
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Indirect Prompt Injection (HIGH): The skill exposes a massive attack surface for indirect injection by processing untrusted data from external websites.
- Ingestion points:
navigate_page,take_snapshot,list_console_messages, andlist_network_requestsall bring external, attacker-controlled content into the agent's context. - Boundary markers: Absent. The instructions do not provide delimiters or guidance for the agent to distinguish between website content and legitimate instructions.
- Capability inventory: High-impact capabilities include
evaluate_script(JS execution),upload_file(local data egress), andfill_form(state change/credential entry). - Sanitization: None. The agent is encouraged to use raw console logs and network data for troubleshooting, which are common injection vectors.
- Command Execution (HIGH): The
evaluate_scripttool provides the ability to execute arbitrary JavaScript in the context of the current page. If the agent is influenced by malicious site content, this tool can be used to steal cookies, bypass CSRF protections, or perform unauthorized actions on the user's behalf. - Data Exposure & Exfiltration (HIGH): The combination of
list_network_requests(which can see sensitive headers and tokens) andupload_file(which can access local files) creates a high risk of sensitive data being exposed to either the agent's context or a malicious website. - Capability Abuse (MEDIUM): The
upload_filetool allows the agent to select and upload local files to web forms. Without strict human-in-the-loop controls, an agent could be tricked by a website (via Category 8) into uploading sensitive local configuration files or SSH keys.
Recommendations
- AI detected serious security threats
Audit Metadata