Automates browser interactions for web testing, form filling, screenshots, and data extraction. Use when the user needs to navigate websites, interact with web pages, fill forms, take screenshots, or extract information from web pages.
87
84%
Does it follow best practices?
Impact
Pending
No eval scenarios have been run
Critical
Do not install without reviewing
Security
3 findings — 1 critical severity, 1 high severity, 1 medium severity. Installing this skill is not recommended: please review these findings carefully if you do intend to do so.
Detected high-risk code patterns in the skill content — including its prompts, tool definitions, and resources — such as data exfiltration, backdoors, remote code execution, credential theft, system compromise, supply chain attacks, and obfuscation techniques.
Malicious code pattern detected (high risk: 0.90). High risk: the skill exposes powerful, intentionally convenient primitives—arbitrary Python/CDP execution, direct access to cookies and Chrome profiles (preserving logins), cookie export/import, cloud browsers that print live URLs, and Cloudflare tunnel provisioning—that can be used to steal credentials, exfiltrate data, or provide remote control/backdoor access if abused.
The skill handles credentials insecurely by requiring the agent to include secret values verbatim in its generated output. This exposes credentials in the agent’s context and conversation history, creating a risk of data exfiltration.
Insecure credential handling detected (high risk: 1.00). The prompt includes explicit CLI examples that take API keys and passwords as literal arguments (e.g., "browser-use cloud login <api-key>" and chained input like typing a password), which would require the agent to accept and emit secret values verbatim, creating exfiltration risk.
The skill exposes the agent to untrusted, user-generated content from public third-party sources, creating a risk of indirect prompt injection. This includes browsing arbitrary URLs, reading social media posts or forum comments, and analyzing content from unknown websites.
Third-party content exposure detected (high risk: 0.90). The skill explicitly navigates and ingests arbitrary public URLs (e.g., "browser-use open <url>") and exposes page content to the agent via commands like `browser-use state`, `browser-use get html`, `browser-use get text`, `browser-use eval "js code"`, and the `browser-use python` CDP recipes (all shown in SKILL.md and references), so untrusted third‑party web content can be read and used to drive interactions and decisions.
702b735
If you maintain this skill, you can claim it as your own. Once claimed, you can manage eval scenarios, bundle related skills, attach documentation or rules, and ensure cross-agent compatibility.