chrome-browser
Warn
Audited by Gen Agent Trust Hub on Apr 24, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The wrapper script
scripts/main.cjsuseschild_process.spawnto execute a local JavaScript file located at.claude/tools/chrome-browser/chrome-browser.cjs. - [REMOTE_CODE_EXECUTION]: The skill provides tools for dynamic code execution within the browser context, such as
mcp__chrome-devtools__evaluate_scriptandmcp__claude-in-chrome__javascript_tool. These allow the agent to run arbitrary JavaScript on any website it visits. - [DATA_EXFILTRATION]: The skill is designed to interact with authenticated web applications. Tools like
get_network_request,take_screenshot, andget_page_textcan be used to capture sensitive personal or corporate data from logged-in sessions. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection due to its processing of untrusted external web content.
- Ingestion points: Web page content (DOM), accessibility trees, console logs, and network traffic via tools like
take_snapshotandread_page. - Boundary markers: None present in the instructions to differentiate between site content and agent instructions.
- Capability inventory: Arbitrary JavaScript execution, network inspection, form filling, and interaction with authenticated apps.
- Sanitization: No sanitization or validation of the ingested browser data is performed before it is presented to the agent.
Audit Metadata