chrome-debug
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [Dynamic Execution] (MEDIUM): The
evaluate_scripttool allows for arbitrary JavaScript execution within the browser context. This is a high-risk capability that could be misused to bypass same-origin policy (SOP) or perform unauthorized actions on websites if an agent is misled. - [Data Exposure & Exfiltration] (MEDIUM): Tools such as
take_screenshotand performance logging write data to user-specified local paths (e.g.,take_screenshot --args '{"filePath":"..."}'). If the underlying implementation does not enforce strict path validation, it could be exploited to overwrite sensitive system files or write data to unauthorized directories. - [Indirect Prompt Injection] (LOW): The skill is a broad surface for indirect prompt injection as it processes untrusted data from the web.
- Ingestion points:
take_snapshot,list_console_messages, andlist_network_requestsinreference/workflows-debugging.mdandreference/workflows-element-interaction.md. - Boundary markers: Absent in the provided documentation.
- Capability inventory: Arbitrary JS execution (
evaluate_script), file writing (take_screenshot), and DOM interaction (click,fill). - Sanitization: No sanitization or filtering of ingested web content is mentioned in the documentation.
Audit Metadata