cursor-ide-browser-skills
Pass
Audited by Gen Agent Trust Hub on Mar 3, 2026
Risk Level: SAFEEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill documentation recommends installing the
snapshot-queryutility from the Python Package Index (PyPI), which is a well-known package registry. - [REMOTE_CODE_EXECUTION]: The workflow involves using
uvxto execute thesnapshot-querytool, which downloads and runs external code at runtime. - [COMMAND_EXECUTION]: The skill utilizes shell commands, including
grepfor searching snapshot files anduvxfor tool execution, as part of its core functionality. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection because it ingests and acts upon untrusted data from web pages and OCR results. Ingestion points: Web content retrieved via
browser_navigateandbrowser_snapshot, and OCR results frommcp_fast-paddleocr-mcp_ocr_image. Boundary markers: No explicit delimiters or instructions are used to isolate untrusted web content from the agent's primary instructions. Capability inventory: The skill provides extensive browser control, includingbrowser_click,browser_type(for text input), andbrowser_navigate. Sanitization: There is no evidence of sanitization or filtering of the ingested web content before it is processed by the agent.
Audit Metadata