CtrlK
BlogDocsLog inGet started
Tessl Logo

catalan-adobe/cdp-connect

Connect Claude Code to an existing Chrome browser via CDP (Chrome DevTools Protocol). Zero dependencies — uses Node 22 built-in WebSocket. Attach to any Chrome running with --remote-debugging-port, then navigate, click, type, screenshot, evaluate JS, read accessibility tree, and monitor console/network. Use when you need to interact with a browser the agent already started, control an existing Chrome instance, or drive browser automation without Playwright MCP. Triggers on: cdp connect, connect to browser, connect to chrome, attach to browser, interact with browser, drive browser, browser automation, control chrome, connect 9222.

100

Quality

100%

Does it follow best practices?

Impact

Pending

No eval scenarios have been run

SecuritybySnyk

Advisory

Suggest reviewing before use

Overview
Quality
Evals
Security
Files

Security

1 medium severity finding. This skill can be installed but you should review these findings before use.

Medium

W011: Third-party content exposure detected (indirect prompt injection risk)

What this means

The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.

Why it was flagged

Third-party content exposure detected (high risk: 1.00). This skill explicitly navigates to arbitrary URLs and ingests page data (see SKILL.md commands like "navigate", "dom", "ax-tree", "screenshot" and scripts/cdp.js which implements Runtime.evaluate, DOM.getOuterHTML, Accessibility.getFullAXTree, and streams console/network events), so it reads untrusted third-party web content that can materially influence follow-up actions.

Report incorrect finding
Audited
Security analysis
Snyk