Browser QA
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill is an instruction-only Browser QA methodology that is internally consistent with its stated purpose, but it omits explicit dependency/installation declarations and includes guidance that could access local browser state or require test credentials — exercise normal operational caution.
This is an instruction-only QA methodology and is coherent with its description, but before running it you should: (1) ensure you have the required tooling (Playwright/Puppeteer/axe-core or an appropriate browser automation setup) installed in a controlled environment; (2) avoid running tests against production with your real Chrome profile — use a dedicated test profile or a headless browser to prevent accidental access to cookies/session data; (3) provide only test/staging credentials (never leak real user credentials) if you need to validate auth flows; (4) review any npm packages the agent suggests installing yourself before executing installs; and (5) if you plan to allow autonomous runs, accept that automation using your local browser may touch local data — prefer isolated CI/staging environments for sensitive sites.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
No visible risk-analysis findings were reported for this release.
