eve-web-ui-testing-agent-browser
Pass
Audited by Gen Agent Trust Hub on May 12, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [PROMPT_INJECTION]: The skill establishes an indirect prompt injection surface by ingesting and processing untrusted content from external web pages via the
agent-browser openandagent-browser snapshotcommands. - Ingestion Points:
agent-browser openandagent-browser snapshotare used across multiple files (e.g.,SKILL.md,templates/capture-workflow.sh,references/snapshot-refs.md) to pull web content into the agent's context. - Boundary Markers: No explicit boundary markers or instructions to ignore embedded instructions are provided when processing extracted web content.
- Capability Inventory: The agent has the capability to perform actions based on this content, including clicking elements, filling forms, and executing JavaScript via the
evalcommand. - Sanitization: No sanitization or validation of the extracted web content is mentioned in the instructions.
- [COMMAND_EXECUTION]: The skill relies on the
agent-browserCLI for its core functionality. This includes theevalcommand, which allows for the execution of arbitrary JavaScript within the browser context. The documentation (references/commands.md) includes examples of using Base64-encoded strings for reliable script execution (e.g.,agent-browser eval -b "ZG9jdW1lbnQucXVlcnlTZWxlY3RvcignW3NyYyo9Il9uZXh0Il0nKQ=="), which decodes to a benign element query but demonstrates a powerful execution vector. - [EXTERNAL_DOWNLOADS]: The skill provides instructions for installing external dependencies, including the
agent-browserutility vianpmorHomebrew. It also mentions an optional installation of an upstream skill from the Vercel Labs repository (https://github.com/vercel-labs/agent-browser).
Audit Metadata