browser-use
Fail
Audited by Gen Agent Trust Hub on Mar 23, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
bu.shscript includes logic to automatically install theuvpackage manager if it is missing. On Unix-like systems, it fetches and executes a script fromhttps://astral.sh/uv/install.sh. On Windows, it uses a PowerShell command to fetch and executehttps://astral.sh/uv/install.ps1. These are established sources for the tool. - [EXTERNAL_DOWNLOADS]: The skill's configuration (
pyproject.toml) specifies a dependency on thebrowser-uselibrary directly from its GitHub repository (github.com/browser-use/browser-use.git), which is downloaded and installed during the initial setup. - [PROMPT_INJECTION]: The
recipe.pyscript implements a recipe system that is susceptible to indirect prompt injection. Data extracted from a web page in one step (using theevaltool) can be stored in a context variable and then interpolated into the JavaScript code of a subsequentevalstep using Python'sformat_map. An attacker controlling a website visited by the skill could potentially craft content that, when extracted and re-executed, runs arbitrary JavaScript in the browser session. - Ingestion points: Data is extracted from web pages via
evalsteps inrecipe.pyand stored in thectxdictionary. - Boundary markers: No boundary markers or instructions are used when interpolating data into subsequent steps.
- Capability inventory: The skill has the ability to interact with the browser, execute arbitrary JavaScript, and access Chrome profiles.
- Sanitization: There is no escaping or validation of the data extracted from pages before it is used in subsequent command interpolation.
- [COMMAND_EXECUTION]: The skill executes shell commands via the
bu.shwrapper script andsubprocess.runinrecipe.py. These calls use list-based arguments to prevent direct command injection. The skill also allows for arbitrary Python and JavaScript execution as part of its core functionality.
Recommendations
- HIGH: Downloads and executes remote code from: https://astral.sh/uv/install.sh - DO NOT USE without thorough review
Audit Metadata