agent-browser
Pass
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: SAFECOMMAND_EXECUTIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The skill uses a CLI tool
agent-browserto perform automation. It includes a commandagent-browser evalwhich allows for the execution of arbitrary JavaScript within the browser context. This is a standard feature for browser testing but requires the agent to handle inputs to this command with care. - [PROMPT_INJECTION]: The skill exposes an attack surface for indirect prompt injection by ingesting untrusted data from the web.
- Ingestion points: The agent retrieves data from web pages using
snapshot,console, andget textcommands (SKILL.md). - Boundary markers: Absent. No delimiters or instructions are provided to the agent to distinguish between its own instructions and content found on web pages.
- Capability inventory: The skill possesses powerful capabilities including the ability to
opennew URLs,fillinput fields,clickelements, andevalJavaScript (SKILL.md). - Sanitization: Absent. Content retrieved from external websites is provided to the agent without filtering or sanitization.
- [COMMAND_EXECUTION]: The skill documentation includes examples using a vendor-specific development bypass URL (
http://localhost:4321/_emdash/api/setup/dev-bypass). This is documented as a mechanism for form verification and matches the author's infrastructure (emdash-cms).
Audit Metadata