playwright-cli
Fail
Audited by Gen Agent Trust Hub on Feb 19, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONDATA_EXFILTRATIONCOMMAND_EXECUTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The
playwright-cli run-codecommand (documented inreferences/running-code.md) allows for the execution of arbitrary JavaScript within the browser context. This provides a direct interface for executing unverified code, which could be exploited to bypass security controls or perform malicious actions if the agent is manipulated by external input. - [DATA_EXFILTRATION] (MEDIUM): The skill includes comprehensive commands for accessing and exporting sensitive browser data. This includes
state-save,cookie-list,localstorage-get, andsessionstorage-list(documented inreferences/storage-state.md). While these are functional for automation, they provide a high-fidelity pathway for exfiltrating authentication tokens and session data. - [COMMAND_EXECUTION] (MEDIUM): The skill is granted broad access to the shell via
Bash(playwright-cli:*). Commands likeplaywright-cli install --skillsandplaywright-cli install-browserperform environment modifications and download external binaries, which can be risky if redirected. - [Indirect Prompt Injection] (LOW): The skill is designed to ingest untrusted data from the web, creating a vulnerability to indirect prompt injection.
- Ingestion points:
playwright-cli snapshotandplaywright-cli evalingest raw DOM and text content from websites into the agent's context. - Boundary markers: The documentation does not specify the use of delimiters or 'ignore' instructions for ingested content.
- Capability inventory: The skill possesses high-impact capabilities including
run-code(arbitrary JS),fill(input manipulation), andstate-save(credential access). - Sanitization: There is no evidence of sanitization or filtering of the web content before it is processed by the agent.
Recommendations
- AI detected serious security threats
Audit Metadata