playwright-cli

Fail

Audited by Snyk on Mar 9, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes commands that place secrets directly into CLI arguments (e.g., playwright-cli fill e2 "password123" and playwright-cli cookie-set session_id abc123), so an agent following it would need to output secret values verbatim, which is an exfiltration risk.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's primary workflows (SKILL.md and references/running-code.md) demonstrate commands like "playwright-cli open/goto https://example.com" and "playwright-cli run-code" / "page.content()" / scraping loops that fetch and interpret arbitrary public web pages and element snapshots, meaning the agent ingests untrusted third‑party web content which can materially influence subsequent actions.
Audit Metadata
Risk Level
HIGH
Analyzed
Mar 9, 2026, 09:58 AM