agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 19, 2026
Risk Level: MEDIUMDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
interactfunction supports anuploadaction that accepts an array of local file paths (file_paths). This capability allows the agent to read local files and upload them to any remote website, creating a path for data exfiltration if the agent is compromised or misled. - [REMOTE_CODE_EXECUTION]: The
executefunction enables the execution of arbitrary JavaScript code within the browser session. This provides a powerful execution primitive that can be used to bypass security controls, access sensitive session data (like cookies), or perform actions on behalf of the user in a way that is difficult to audit. - [PROMPT_INJECTION]: The skill is highly susceptible to indirect prompt injection because it is designed to ingest and process content from untrusted external web pages.
- Ingestion points: Untrusted data enters the agent context through the
open,snapshot, andexecutefunctions (e.g., scrapinginnerTextorelements_text). - Boundary markers: There are no explicit boundary markers or instructions provided to the agent to treat webpage content as untrusted or to ignore embedded instructions.
- Capability inventory: The skill has high-impact capabilities including
execute(arbitrary JS),upload(file access), andinteract(form filling and clicking). - Sanitization: Content retrieved from the web (HTML, text, attributes) is returned to the agent without sanitization or filtering.
Audit Metadata