playwright-cli
Warn
Audited by Gen Agent Trust Hub on Apr 2, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [EXTERNAL_DOWNLOADS]: The skill's documentation suggests using
npx playwright-clias a fallback for local installation, which involves downloading and executing packages from the public NPM registry at runtime.\n- [REMOTE_CODE_EXECUTION]: The use ofnpxconstitutes remote code execution from an external registry. Furthermore, the skill provides arun-codecommand designed to execute arbitrary Playwright and Node.js code passed as a string argument.\n- [COMMAND_EXECUTION]: The skill makes extensive use of system commands through theplaywright-clibinary. It includes anevalcommand that executes arbitrary JavaScript within the context of the active web page.\n- [DATA_EXFILTRATION]: The skill provides numerous commands to access sensitive user data within the browser, includingcookie-get,cookie-list,localstorage-get, andsessionstorage-get. It also provides instructions for reading the system clipboard viarun-code(navigator.clipboard.readText()).\n- [PROMPT_INJECTION]: The skill has a high surface area for indirect prompt injection. It navigates to and extracts data from external websites (viagoto,open, andsnapshot) and has powerful capabilities (file writes, network access, code execution). There are no mentioned boundary markers or sanitization steps to prevent malicious web content from influencing the agent's behavior through the snapshots provided.\n - Ingestion points: Browser navigation and snapshots of web page content (SKILL.md).\n
- Boundary markers: Absent; snapshots are provided to the agent without explicit instructions to ignore embedded commands.\n
- Capability inventory: File system writes (
screenshot,pdf,state-save,video-stop), arbitrary JS execution (eval,run-code), and network operations via the browser.\n - Sanitization: Absent; the skill does not appear to filter or sanitize the DOM content before presenting snapshots to the agent.
Audit Metadata