agent-browser
Pass
Audited by Gen Agent Trust Hub on Mar 29, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructs the installation of the
agent-browserpackage via NPM and the download of Chromium binaries. These resources originate from the GitHub organization 'vercel-labs', which is a recognized and trusted service provider. Documentation for Browserbase, a cloud browser provider, is also included for enterprise/CI workflows. - [COMMAND_EXECUTION]: The skill provides a set of CLI commands (
agent-browser open,click,fill, etc.) that execute browser interactions. This includes theevalcommand, which allows the execution of arbitrary JavaScript within the browser context. While powerful, this is a standard and expected feature for browser automation tools. - [INDIRECT_PROMPT_INJECTION]: As a tool designed to process and interact with live web content, the skill inherently possesses an indirect prompt injection surface.
- Ingestion points: Data enters the agent's context through
snapshot,get text,get html, andscreenshotcommands defined inSKILL.md. - Boundary markers: The provided instructions do not specify any delimiters or safety warnings to help the agent distinguish between its system instructions and content retrieved from websites.
- Capability inventory: The skill provides significant capabilities including JavaScript execution (
eval), form interaction (fill,click), file uploads (upload), and network routing control, all visible acrossSKILL.md. - Sanitization: There is no evidence of sanitization or filtering of external content before it is processed or presented to the agent.
- [DATA_EXPOSURE]: The skill includes functionality to save and load browser state (including authentication cookies) to a local file (
auth.json). This is a standard session persistence feature but requires careful handling of the resulting state files by the user.
Audit Metadata