playwright-debugger
Warn
Audited by Gen Agent Trust Hub on Mar 12, 2026
Risk Level: MEDIUMCOMMAND_EXECUTIONEXTERNAL_DOWNLOADS
Full Analysis
- [DYNAMIC_EXECUTION]: The skill relies on
node -eto execute inline JavaScript for processing data streams fromresults.jsonandtrace.zipfiles. - [DYNAMIC_EXECUTION]: Provides shell command templates (e.g., for Phase 3 trace analysis) that require the agent to manually replace placeholders like
SNAPSHOT_NAME. If the provided value contains shell metacharacters or JavaScript escape sequences, it could lead to arbitrary command execution. - [UNVERIFIABLE_DEPENDENCIES_AND_REMOTE_CODE_EXECUTION]: Downloads test report artifacts and PR metadata from GitHub using the
ghCLI tool and runsnpx playwright test. These are well-known tools used for their standard functionality. - [INDIRECT_PROMPT_INJECTION]: The skill ingests and processes untrusted data from test report files (Phase 1 and Phase 3). There are no boundary markers or sanitization steps to prevent malicious content within these files from influencing the parsing logic or the agent's summary. 1. Ingestion points:
playwright-report/results.json,trace.zip(viaunzip -p). 2. Boundary markers: None present. 3. Capability inventory:gh,npx,node,jq,unzip,find. 4. Sanitization: None detected.
Audit Metadata