browser-cdp
Fail
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: HIGHCREDENTIALS_UNSAFECOMMAND_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [CREDENTIALS_UNSAFE]: The script
scripts/setup-cdp-chrome.jsprogrammatically accesses and copies sensitive browser files that store user credentials. - Evidence: The script identifies the Chrome user data directory and copies the
CookiesandLogin Data(which contains saved passwords) files from the user's default profile to a debug profile folder at~/chrome-debug-profile. - Impact: This allows the skill to bypass normal browser security boundaries and gain access to the user's stored authentication data.
- [COMMAND_EXECUTION]: The skill executes forceful system-level commands to terminate running applications.
- Evidence: The script uses
pkill -9 -x 'Google Chrome'on macOS/Linux andtaskkill /F /IM chrome.exeon Windows. - Impact: Abruptly closes all open browser windows without saving state or prompting the user, in order to relaunch Chrome with a debugging port enabled.
- [DATA_EXFILTRATION]: The skill's instructions explicitly guide the agent to extract secret session identifiers.
- Evidence:
SKILL.mdprovides examples for the agent to execute JavaScript that retrieves data fromlocalStorage.getItem("token")anddocument.cookie. - Impact: Specifically designed to harvest active session tokens for potentially unauthorized account access.
Recommendations
- AI detected serious security threats
Audit Metadata