This QA testing skill allows arbitrary JavaScript execution and extensive data collection, posing a significant risk for data ex
Claims to do
Chrome Testing Knowledge: These are the tools available when Claude Code is connected to Chrome (`claude --chrome`):
Actually does
This skill describes a set of browser-based testing tools: `read_network_requests` to capture HTTP traffic, `read_console_messages` for console output, `javascript_tool` to execute arbitrary JS for page inspection, `computer: screenshot` and `gif_creator` for visual capture, and `read_page` for DOM/accessibility tree analysis. It provides guidance on using these tools for common bug patterns, console message triage, network health, and useful JavaScript snippets.
The `javascript_tool` allows the execution of arbitrary JavaScript code within the browser context, enabling powerful actions like data exfiltration, DOM manipulation, and session hijacking.
javascript_tool | Execute arbitrary JS to inspect page state | tabId, text (JS code)
The combination of `read_network_requests`, `read_page`, and `javascript_tool` provides extensive capabilities to collect sensitive network traffic, DOM content, and browser state, which could be exfiltrated.
`read_network_requests`, `read_page`, `javascript_tool`
The skill explicitly provides a JavaScript snippet that modifies native browser functions (`window.setInterval`), demonstrating the ability to hook and alter browser runtime behavior, which could be abused for monitoring or persistence.
window.__intervals = window.__intervals || 0; const origSetInterval = window.setInterval; window.setInterval = (...args) => { window.__intervals++; return origSetInterval(...args); }; window.__intervalsThe skill grants access to comprehensive browser telemetry including network requests, console messages, and performance metrics, which can be used for extensive reconnaissance of user activity and application state.
`read_network_requests`, `read_console_messages`, `performance.getEntriesByType` snippets
The skill provides highly powerful and potentially dangerous browser interaction tools under the guise of 'QA testing,' which could be exploited by a malicious prompt to bypass human oversight for unintended actions.
description: Knowledge base for QA testing..., combined with `javascript_tool` capabilities
[](https://mondoo.com/ai-agent-security/skills/github/victor-qin/chrome-test-runner-plugin/chrome-testing)<a href="https://mondoo.com/ai-agent-security/skills/github/victor-qin/chrome-test-runner-plugin/chrome-testing"><img src="https://mondoo.com/ai-agent-security/api/badge/github/victor-qin/chrome-test-runner-plugin/chrome-testing.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/github/victor-qin/chrome-test-runner-plugin/chrome-testing.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.