playwright-skill
Fail
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: HIGHCOMMAND_EXECUTIONEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONPROMPT_INJECTION
Full Analysis
- COMMAND_EXECUTION (HIGH): The
run.jsscript takes arbitrary input fromprocess.argvorstdinand writes it to a temporary file (.temp-execution-[timestamp].js), which is then executed usingrequire(). This allows the execution of any Node.js code on the host system. - EXTERNAL_DOWNLOADS (MEDIUM): The
installPlaywrightfunction automatically invokesnpm installandnpx playwright installif the Playwright dependency is missing, performing network operations and package installation at runtime without user confirmation. - REMOTE_CODE_EXECUTION (HIGH): The execution flow allows untrusted input to be converted directly into executable code, providing a high-risk surface for Remote Code Execution (RCE) via the agent's input channel.
- PROMPT_INJECTION (LOW): The skill is susceptible to indirect prompt injection as it lacks sanitization for the code it executes.
- Ingestion points:
run.js(reads fromprocess.argvandprocess.stdin). - Boundary markers: Absent; no delimiters or instructions to ignore embedded commands are present.
- Capability inventory:
run.jscontainsfs.writeFileSync,require()(execution), andexecSync(package installation). - Sanitization: Absent; the input is wrapped in a basic template and executed without validation.
Recommendations
- AI detected serious security threats
Audit Metadata