dev-browser
Warn
Audited by Gen Agent Trust Hub on Mar 13, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill requires running a local shell script (
./skills/dev-browser/server.sh) to start a background process and usesbun x tsxwith heredocs to execute dynamically generated TypeScript code. - [EXTERNAL_DOWNLOADS]: The setup process is described as automatically installing dependencies and downloading the Playwright Chromium browser during its first run.
- [PROMPT_INJECTION]: The skill is vulnerable to Indirect Prompt Injection when navigating to external websites, as it lacks sanitization for retrieved content like ARIA snapshots or page text.
- [PROMPT_INJECTION]: Mandatory Evidence Chain:
- Ingestion points: The agent ingests untrusted data from web pages via
client.getAISnapshot()andpage.goto()as seen inSKILL.md. - Boundary markers: Absent. There are no instructions to use delimiters or warnings when processing retrieved web content.
- Capability inventory: The skill can execute shell commands (
bun x tsx), write files (screenshots intmp/), and perform network operations. - Sanitization: Absent. The skill does not describe any methods for sanitizing or validating data retrieved from the browser context before further processing.
Audit Metadata