chrome-automation
Warn
Audited by Gen Agent Trust Hub on May 10, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill relies on the
agent-browserCLI to control the user's local browser instance. It specifically utilizes theevalcommand to execute arbitrary JavaScript within the browser context (e.g.,agent-browser --auto-connect eval '...'), which can be used to manipulate page state or bypass UI constraints. - [DATA_EXFILTRATION]: By connecting to the user's active Chrome session via
--auto-connect, the agent gains access to sensitive state, including authentication cookies and the contents of all open tabs (visible viatab list). The instructions explicitly direct the agent to check existing tabs to reuse login states, exposing those URLs and titles to the model. - [REMOTE_CODE_EXECUTION]: The skill supports "Replaying Recordings" in JavaScript format (Puppeteer JS). This pattern involves interpreting or executing external logic provided in recording files, which could be exploited to run harmful operations within the browser environment.
- [EXTERNAL_DOWNLOADS]: The skill requires the installation of the
agent-browserpackage (npm install -g agent-browser), which is an external dependency from Vercel Labs. While originating from a well-known source, it provides the fundamental capability for the agent to control the user's local environment. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection because it is designed to read and interact with untrusted content from the public internet (e.g., social media comments, Reddit posts). Malicious instructions embedded in a web page could trick the agent into using its
evalorclickcapabilities for unintended actions like transferring data or deleting accounts. - Ingestion points:
agent-browser snapshot -i,get text body, and reading external recording files (JSON/JS). - Boundary markers: Missing. The skill relies on high-level instructions to "confirm with the user" rather than technical delimiters to isolate untrusted web data from the agent's command logic.
- Capability inventory: Full browser automation (navigation, clicking, form filling) and arbitrary JavaScript execution (
eval) via theagent-browsertool. - Sanitization: None. The skill processes raw page text and snapshots directly without filtering for potential instruction injection.
Audit Metadata