web-research-workflow
Warn
Audited by Gen Agent Trust Hub on Feb 20, 2026
Risk Level: MEDIUMCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- Data Exposure & Exfiltration (MEDIUM): The skill saves browser session states, which may include sensitive authentication cookies and tokens, to
/tmp/session-example.jsoninrules/browser-patterns.md. In shared or multi-agent environments, this file could be read by unauthorized processes.\n- Dynamic Execution (MEDIUM): The skill utilizesagent-browser evalto execute JavaScript snippets on external web pages for data extraction as seen inrules/browser-patterns.mdandrules/monitoring-competitor.md. This dynamic execution against untrusted DOM structures could be exploited if a malicious site is designed to manipulate the extraction logic.\n- Indirect Prompt Injection (LOW): The skill ingests untrusted data from the web through multiple tiers (WebFetch, Tavily, agent-browser), creating a surface for injection.\n - Ingestion points: WebFetch tool, Tavily API responses (Search, Extract, Crawl), and browser DOM content.\n
- Boundary markers: Absent; no explicit delimiters or system instructions are provided to the agent to ignore or isolate instructions found within the scraped content.\n
- Capability inventory:
Bash(curl for API calls),Write(saving snapshots/diffs),WebFetch, andagent-browser.\n - Sanitization: Absent; scraped data is processed directly via
jqanddiffwithout validation or escaping.\n- Data Exposure & Exfiltration (LOW): The skill transmits user-defined queries and an API key (TAVILY_API_KEY) toapi.tavily.com. While this is core to its functionality, it represents data flow to a non-whitelisted third-party service.
Audit Metadata