agent-browser
Warn
Audited by Gen Agent Trust Hub on May 9, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill instructions direct the agent to install the
agent-browsertool usingnpm,brew, orcargo. Additionally, the commandagent-browser installdownloads Chrome/Chromium binaries from remote sources, andagent-browser upgradefetches updates for the tool. Use of the Lightpanda engine also involves external downloads. - [COMMAND_EXECUTION]: The skill relies on executing shell commands via the
Bashtool. It specifically includes anevalcommand that allows for the execution of arbitrary JavaScript code within the browser context, which is a powerful capability for automation but poses a risk if executing untrusted code. - [DATA_EXFILTRATION]: The tool possesses significant data extraction capabilities, including taking screenshots (
screenshot), generating PDFs (pdf), and downloading files (download). It can also access the system clipboard usingagent-browser clipboard readand stream browser session data over WebSockets viaagent-browser stream enableor the background dashboard server. - [CREDENTIALS_UNSAFE]: By default, browser authentication states (cookies and local storage) are saved in plaintext JSON files (e.g.,
auth.json). While the tool supports encryption via theAGENT_BROWSER_ENCRYPTION_KEYenvironment variable, the default behavior exposes session tokens on the local filesystem. - [PROMPT_INJECTION]: The skill is inherently exposed to indirect prompt injection because it processes content from arbitrary websites. A malicious page could embed instructions intended to manipulate the agent's behavior. The skill includes a
--content-boundariesflag and domain allowlisting as mitigations, but the risk persists when interacting with untrusted web content. - [COMMAND_EXECUTION]: The
--allow-file-accessflag enables the browser to access local files using thefile://protocol, which could lead to unauthorized data exposure if an agent is tricked into navigating to a local path or file during a session.
Audit Metadata