firefox-debug
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTION
Full Analysis
- REMOTE_CODE_EXECUTION (MEDIUM): The
evaluateScripttool enables the execution of arbitrary JavaScript within the browser context. In an agentic workflow, this allows the AI to run any code on a webpage, which could be exploited to perform actions on behalf of the user or interact with malicious scripts. - DATA_EXFILTRATION (MEDIUM): The skill provides direct access to sensitive browser data. Specifically, the
getStoragetool is showcased in documentation examples (SKILL.md) to extract 'auth_token' from localStorage. While useful for debugging, this capability facilitates the exposure of session credentials. - COMMAND_EXECUTION (MEDIUM): The skill's operational model relies on shell command execution via
mcporterandmise(e.g.,mise x node@20 -- mcporter call ...). This creates a dependency on the underlying host's shell environment for all browser interactions. - PROMPT_INJECTION (LOW): The skill is highly vulnerable to Indirect Prompt Injection (Category 8). It ingests untrusted data from external websites via
getPageContentandgetConsoleOutput. - Ingestion points:
getPageContent,getConsoleOutput, andgetStorageinSKILL.md. - Boundary markers: None identified; the agent reads raw DOM and console data.
- Capability inventory: Subprocess calls via
mcporter, arbitrary JS execution viaevaluateScript, and navigation control vianavigateToUrl. - Sanitization: No evidence of sanitization or filtering of the retrieved web content before it is processed by the agent.
Audit Metadata