browserpilot-executor

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt explicitly shows embedding secrets verbatim into requests (e.g., typing the password "secret123" into POST /type and using headers like X-BrowserWing-Key: or Authorization: Bearer ), so the agent would need to handle and output secret values directly, creating an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). This skill explicitly navigates to arbitrary URLs via POST /navigate and ingests page content via endpoints like GET /page-content, GET /page-text, GET /semantic-tree and POST /extract, so the agent will fetch and interpret untrusted public web content (third‑party websites/user-generated pages), enabling indirect prompt injection.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 01:24 AM