playwright-skill
Warn
Audited by Gen Agent Trust Hub on Mar 5, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONREMOTE_CODE_EXECUTIONDATA_EXFILTRATION
Full Analysis
- [DYNAMIC_EXECUTION]: The
run.jsscript implements a pattern for executing arbitrary JavaScript code. It takes input from command-line arguments, files, or stdin, writes it to a temporary file in the skill directory (.temp-execution-*.js), and then executes it usingrequire(). This constitutes dynamic code execution from computed paths. - [COMMAND_EXECUTION]: The skill's primary execution model involves the agent writing custom scripts and executing them via the
run.jswrapper. This provides a direct path for the agent to execute Node.js commands, which can include shell command execution via thechild_processmodule. - [INDIRECT_PROMPT_INJECTION]: The skill is designed to interact with external websites and extract content using helpers like
extractTextsandextractTableData. - Ingestion points: Data enters the agent's context through web scraping helpers in
lib/helpers.jsand Playwright's native page content functions. - Boundary markers: No explicit boundary markers or instructions to ignore embedded commands are used when processing scraped content.
- Capability inventory: The skill possesses full Node.js execution capabilities through
run.js, file system access, and network access. - Sanitization: There is no evidence of sanitization or filtering of the content retrieved from external websites before it is processed by the agent.
- [DATA_EXFILTRATION]: The
detectDevServersfunction inlib/helpers.jsprobes the local machine's network by attempting to connect to common development ports (e.g., 3000, 3001, 8080). While intended for automated testing setup, this capability allows for internal network discovery.
Audit Metadata