playwright-cli
Fail
Audited by Snyk on Mar 9, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt includes commands that place secrets directly into CLI arguments (e.g., playwright-cli fill e2 "password123" and playwright-cli cookie-set session_id abc123), so an agent following it would need to output secret values verbatim, which is an exfiltration risk.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). The skill's primary workflows (SKILL.md and references/running-code.md) demonstrate commands like "playwright-cli open/goto https://example.com" and "playwright-cli run-code" / "page.content()" / scraping loops that fetch and interpret arbitrary public web pages and element snapshots, meaning the agent ingests untrusted third‑party web content which can materially influence subsequent actions.
Audit Metadata