browser-bridge
Fail
Audited by Gen Agent Trust Hub on May 6, 2026
Risk Level: HIGHDATA_EXFILTRATIONCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DATA_EXFILTRATION]: The skill provides explicit functionality to extract cookies from any URL. The
background.jsscript in the Chrome extension includes ahandleCookiesfunction that utilizes thechrome.cookies.getAllAPI to retrieve all cookies, which are then passed back through the bridge to the CLI/Python environment. - [COMMAND_EXECUTION]: The extension and bridge allow for the execution of arbitrary JavaScript in any browser tab. This is facilitated via the
execcommand inbrowser.pyand implemented usingchrome.scripting.executeScriptand the high-privilegechrome.debugger(CDP) API inbackground.js. - [REMOTE_CODE_EXECUTION]: The bridge architecture in
TMWebDriver.pystarts a WebSocket server and an HTTP server on the local machine. This allows any process (including the AI agent) to send and execute code within the browser context. Theexecute_jsmethod serves as a remote execution interface to the browser's scripting environment. - [EXTERNAL_DOWNLOADS]: The skill's documentation (
SKILL.md) instructs users to manually install external Python dependencies includingbs4,simple-websocket-server,bottle, andrequestsusing pip. - [PRIVILEGE_ESCALATION]: The Chrome extension manifest requests extremely broad permissions (
cookies,debugger,management,scripting, and<all_urls>). Crucially,background.jsproactively stripsContent-Security-PolicyandContent-Security-Policy-Report-Onlyheaders from all network responses using thedeclarativeNetRequestAPI, which removes a critical layer of browser defense for the user.
Recommendations
- AI detected serious security threats
Audit Metadata