SSRF after clicks; workspace .env restrictions; sanitized node exec summaries as untrusted system events.
Security: browser, dotenv, node exec
- Browser: blocked-destination checks re-run after interaction-driven navigations so SSRF quarantine cannot be bypassed by clicking through to forbidden URLs.
- dotenv: runtime-control, browser-control, and skip-server env vars are blocked from untrusted workspace
.envfiles. - Gateway/node:
exec.started/finished/deniedfrom remote nodes are treated as untrusted and sanitized before they can become trustedSystem:content.