using-playwright-cli
Warn
Audited by Gen Agent Trust Hub on Mar 28, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEEXTERNAL_DOWNLOADS
Full Analysis
- [COMMAND_EXECUTION]: The skill documents the use of
evalandrun-codecommands, which permit the execution of arbitrary JavaScript within the active browser context. - [DATA_EXFILTRATION]: The skill provides instructions for retrieving sensitive session information through commands like
cookie-get,cookie-list,localstorage-get, andstate-save. These can be used to extract authentication tokens and session identifiers. - [DATA_EXFILTRATION]: Content capture commands such as
snapshot,screenshot, andpdfallow the agent to export visible or structured page data, which may contain sensitive personal or corporate information. - [CREDENTIALS_UNSAFE]: Documentation examples illustrate the handling of credentials, including filling password fields and manually setting authentication cookies.
- [EXTERNAL_DOWNLOADS]: The skill uses
npxto fetch and execute the@playwright/clipackage from the npm registry, which is a standard distribution method for this tool from a well-known provider. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection (Category 8) because it instructs the agent to read and process content from external websites via the
snapshotandevalcommands, which could contain malicious instructions designed to manipulate the agent's behavior.
Audit Metadata