agent-browser
Warn
Audited by Gen Agent Trust Hub on Mar 18, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
agent-browser evalcommand provides the capability to execute arbitrary JavaScript code within the browser context, which could be abused if the agent is influenced by malicious instructions.\n- [DATA_EXFILTRATION]: The skill exposes commands to retrieve sensitive session information, includingagent-browser cookies,agent-browser storage local, andagent-browser state save, which can be used to capture authentication tokens or private user data.\n- [PROMPT_INJECTION]: The skill is susceptible to Indirect Prompt Injection because it processes content from external websites. Mandatory evidence: 1) Ingestion points: Data is ingested viaagent-browser open,snapshot, andgetcommands (SKILL.md). 2) Boundary markers: The skill lacks explicit markers or instructions to isolate untrusted web content from agent commands. 3) Capability inventory: The skill can execute code (eval), write files (screenshot,pdf,state save), and access session secrets. 4) Sanitization: No sanitization of web-derived content is performed before processing.
Audit Metadata