playwright
Fail
Audited by Gen Agent Trust Hub on Feb 16, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION] (HIGH): The skill exposes
pwcli evalandpwcli run-codecommands inreferences/cli.md. These commands allow the execution of arbitrary JavaScript within the browser context. An attacker (or a malicious website via indirect injection) could use this to execute code to steal credentials, manipulate the DOM, or perform actions on behalf of the user.\n- [PROMPT_INJECTION] (HIGH): The skill is highly vulnerable to Indirect Prompt Injection (Category 8).\n - Ingestion points: The skill reads content from external websites via
snapshotandevalcommands.\n - Boundary markers: None. There are no delimiters or instructions to ignore embedded commands in the data retrieved from pages.\n
- Capability inventory: Very High. The agent can control a browser, take screenshots, save PDFs, and execute arbitrary JS.\n
- Sanitization: None. Web content is processed directly by the agent to determine next steps.\n
- Risk: A malicious website could contain hidden instructions that redirect the agent's task, such as stealing data from other open tabs or sessions.\n- [DATA_EXFILTRATION] (MEDIUM): The tool can be used to access sensitive session data (cookies, localStorage) and send it to external URLs. The
references/cli.mdexplicitly describes commands to interact with any URL and execute code, which provides a direct path for data theft if the agent is misled.\n- [EXTERNAL_DOWNLOADS] (LOW): Thescripts/playwright_cli.shscript usesnpx --yes --package @playwright/clito download and execute the Playwright CLI at runtime. While the author (OpenAI) and the package are within the trusted scope, runtime downloads with bypassed confirmation (--yes) are a security risk if the registry or package is compromised. Severity is downgraded per [TRUST-SCOPE-RULE].\n- [COMMAND_EXECUTION] (LOW): The skill relies on executing shell commands via theplaywright_cli.shwrapper. While expected for a CLI tool, it increases the attack surface if the agent is not properly sandboxed.
Recommendations
- AI detected serious security threats
Audit Metadata