browser-tools
Warn
Audited by Gen Agent Trust Hub on Mar 1, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [DATA_EXFILTRATION]: The
browser-cookies.jsscript allows the agent to extract all cookies from the active browser tab, including those withhttpOnlyandsecureflags. This capability could be abused to hijack user sessions if the agent is manipulated by an attacker. - [DATA_EXFILTRATION]: The
browser-start.jsscript includes a--profilefeature that clones the user's primary Chrome profile—containing logins, cookies, and history—from~/Library/Application Support/Google/Chrome/to a local cache directory. This creates an unencrypted copy of sensitive user data. - [COMMAND_EXECUTION]: Several scripts execute system commands and manage local processes. Specifically,
browser-start.jsusesexecSyncto runrsyncfor profile copying andrmfor clearing system locks, and usesspawnto launch the Google Chrome executable. - [COMMAND_EXECUTION]: The
browser-eval.jsscript uses thenew AsyncFunctionconstructor to execute arbitrary JavaScript code strings within the browser context. This is a form of dynamic execution that can be exploited if the input string is controlled by an untrusted source. - [PROMPT_INJECTION]: The skill is highly vulnerable to indirect prompt injection due to its core function of browsing and extracting web content.
- Ingestion points:
browser-content.js,browser-eval.js, andbrowser-hn-scraper.jspull raw data from external websites into the agent's context. - Boundary markers: There are no markers or instructions used to prevent the agent from following commands embedded in the scraped HTML or markdown.
- Capability inventory: The agent has high-privilege tools available including cookie extraction, JavaScript evaluation, and navigation.
- Sanitization: No sanitization or filtering is performed on the data retrieved from external URLs before it is processed or presented to the agent.
Audit Metadata