playwright-automation
Pass
Audited by Gen Agent Trust Hub on Mar 17, 2026
Risk Level: SAFECOMMAND_EXECUTIONEXTERNAL_DOWNLOADSPROMPT_INJECTION
Full Analysis
- [COMMAND_EXECUTION]: The
install.pyscript usessubprocess.runto execute hardcoded shell commands for environment setup, specifically installing the Playwright package and the Chromium browser engine. - [EXTERNAL_DOWNLOADS]: The skill downloads the
playwrightlibrary and Chromium binaries from standard package registries (PyPI) and official browser distribution channels. - [PROMPT_INJECTION]: The skill facilitates the ingestion of untrusted data from the web, creating a surface for indirect prompt injection. * Ingestion points: Web content is retrieved through methods like
page.goto,page.content, andpage.text_contentinSKILL.mdand the example scriptsexamples/basic.pyandexamples/search_example.py. * Boundary markers: No explicit delimiters or instructions to ignore embedded commands are present in the provided snippets. * Capability inventory: The skill is configured withBash,Exec,Read, andWritecapabilities inSKILL.mdmetadata, allowing the agent to perform system-level actions based on scraped content. * Sanitization: There is no evidence of data sanitization or filtering applied to the scraped web content before it is processed by the agent.
Audit Metadata