agent-browser
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTIONPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill includes an
evalcommand that allows the execution of arbitrary JavaScript within the browser context. It explicitly supports a-bflag for Base64-encoded strings, which functions as an obfuscation primitive to hide the intent of executed scripts. - [DATA_EXFILTRATION] (HIGH): The skill features an
--allow-file-accessflag that permits the browser to read local files viafile://URLs. An attacker-controlled website could potentially use this in conjunction with the agent's interaction capabilities to read sensitive system files and exfiltrate them. - [COMMAND_EXECUTION] (MEDIUM): The documentation references external shell scripts located in a
templates/directory (e.g.,form-automation.sh). These external dependencies are not defined within the skill itself and represent unverifiable code execution. - [CREDENTIALS_UNSAFE] (MEDIUM): The
state saveand session persistence features store sensitive authentication data, including cookies and localStorage, to the local file system (~/.agent-browser/sessions/). This creates a persistence mechanism for sensitive credentials that could be targeted by other malicious processes. - [PROMPT_INJECTION] (LOW): The skill is highly vulnerable to indirect prompt injection because it is designed to ingest and process unstructured data from arbitrary external websites via
snapshotandget text. Evidence: 1. Ingestion points:get text,snapshot,get title. 2. Boundary markers: Absent. 3. Capability inventory: JavaScript execution, file system access, network navigation, form interaction. 4. Sanitization: Absent.
Recommendations
- AI detected serious security threats
Audit Metadata