chrome-devtools-axi-browser-automation
Fail
Audited by Snyk on May 18, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 0.80). The skill includes examples that pass credentials directly into commands (e.g., chrome-devtools-axi fillform @g1:2=password and inline Authorization header examples), which would require an agent to emit secret values verbatim in generated commands—although env-var patterns are shown, the inline-credential examples create an exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). This skill (SKILL.md) instructs the agent to navigate to arbitrary public URLs (e.g., "chrome-devtools-axi open https://example.com", "newpage https://github.com"), capture snapshots and eval JavaScript ("snapshot", "eval"), read console/network responses and use snapshot refs and suggested next steps to drive follow-up actions, so untrusted third-party page content can be ingested and materially influence agent behavior.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 0.90). The skill instructs the agent to run "npx -y chrome-devtools-axi", which fetches and executes remote package code from the npm registry (e.g. https://registry.npmjs.org/chrome-devtools-axi), so this is a runtime fetch that executes remote code and is a required dependency.
Issues (3)
W007
HIGHInsecure credential handling detected in skill instructions.
W011
MEDIUMThird-party content exposure detected (indirect prompt injection risk).
W012
MEDIUMUnverifiable external dependency detected (runtime URL that controls agent).
Audit Metadata