skills/jarmen423/skills/agent-browser/Gen Agent Trust Hub

agent-browser

Warn

Audited by Gen Agent Trust Hub on Mar 21, 2026

Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
  • [COMMAND_EXECUTION]: The agent-browser eval and agent-browser wait --fn commands allow the execution of arbitrary JavaScript code within the browser context. This capability can be abused if the agent is directed to run code derived from untrusted web content.
  • [DATA_EXFILTRATION]: The skill provides commands to access and persist sensitive information. agent-browser cookies retrieves session cookies, and agent-browser state save writes cookies, local storage, and other session metadata to local files. Additionally, agent-browser screenshot and agent-browser pdf can write page content to the file system.
  • [EXTERNAL_DOWNLOADS]: The skill supports the use of custom browser executables via the --executable-path flag and the loading of arbitrary browser extensions via the --extension flag. These could be used to modify browser behavior or execute untrusted code if misconfigured by the user or an attacker.
  • [PROMPT_INJECTION]: The skill facilitates the ingestion of untrusted data from the internet via snapshot, get text, and get html commands. This content is provided to the agent's context without explicit boundary markers or sanitization. The skill possesses high-privilege capabilities including file writing (screenshots, state saving), network configuration (proxies, routing), and code execution (eval), and does not implement sanitization for the external content before presenting it to the agent, creating a clear surface for indirect prompt injection attacks.
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 21, 2026, 02:12 AM