Browser QA

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is an instruction-only Browser QA methodology that is internally consistent with its stated purpose, but it omits explicit dependency/installation declarations and includes guidance that could access local browser state or require test credentials — exercise normal operational caution.

This is an instruction-only QA methodology and is coherent with its description, but before running it you should: (1) ensure you have the required tooling (Playwright/Puppeteer/axe-core or an appropriate browser automation setup) installed in a controlled environment; (2) avoid running tests against production with your real Chrome profile — use a dedicated test profile or a headless browser to prevent accidental access to cookies/session data; (3) provide only test/staging credentials (never leak real user credentials) if you need to validate auth flows; (4) review any npm packages the agent suggests installing yourself before executing installs; and (5) if you plan to allow autonomous runs, accept that automation using your local browser may touch local data — prefer isolated CI/staging environments for sensitive sites.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

No visible risk-analysis findings were reported for this release.