layout-inspecting
Audited by Socket on Mar 2, 2026
1 alert found:
SecurityThis skill is coherent with its stated purpose: it runs a headless Playwright browser against a URL, collects computed styles and bounding boxes, and produces a JSON layout tree and optional images. The primary supply-chain and security concerns are: (1) automatic runtime downloads of Playwright/Chromium (download-execute pattern) which increases supply-chain risk; (2) the ability to navigate arbitrary URLs including localhost/internal endpoints, which can expose sensitive DOM-rendered secrets to extraction; and (3) reliance on third-party browser binaries and npm dependencies installed at runtime. There is no direct evidence in the documentation of covert exfiltration to attacker-controlled endpoints, direct reading of host credential files, obfuscation, or embedded backdoors. Overall the package is functionally appropriate for the described task but presents a medium security risk primarily from supply-chain download behavior and the potential to scrape sensitive internal content when run with broad agent permissions. Operators should: restrict allowed target URLs, run the tool in isolated environments, pin and verify Playwright/Chromium sources, and audit any automatic install steps before first-run.