playwright-cli

Fail

Audited by Snyk on Mar 9, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 0.80). The skill’s CLI examples show embedding plaintext secrets directly in commands (e.g., playright-cli fill e2 "password123"), which encourages the agent to accept and output secret values verbatim in generated commands — an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's workflow and references explicitly show opening arbitrary public URLs and scraping/executing page content (e.g., SKILL.md "playwright-cli open https://example.com" and references/running-code.md using page.content(), scraping loops, and references/test-generation.md generating actions from page content), so untrusted third‑party webpages can be ingested and materially influence subsequent actions.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 9, 2026, 11:17 PM