playwright-local
Pass
Audited by Gen Agent Trust Hub on Mar 10, 2026
Risk Level: SAFEPROMPT_INJECTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFECOMMAND_EXECUTION
Full Analysis
- [PROMPT_INJECTION]: The skill is designed to ingest and process untrusted content from arbitrary websites, creating a surface for Indirect Prompt Injection where malicious instructions embedded in a webpage could influence the agent's behavior.
- Ingestion points: Web content is fetched and returned to the agent context in
templates/basic-scrape.ts,templates/stealth-mode.ts, andSKILL.mdusingpage.goto(),page.textContent(), andpage.$$eval(). - Boundary markers: No explicit delimiters or system-level instructions to ignore embedded commands within the scraped data are present in the code templates.
- Capability inventory: The skill uses scripts that can launch local browser processes (
browser.launch), execute JavaScript in the browser (page.evaluate), write files to the local disk (fs.writeFile), and perform network requests. - Sanitization: The scraped content is processed and returned without sanitization or filtering for potentially malicious instructions.
- [DATA_EXFILTRATION]: Documentation in
references/common-blocks.mdincludes implementation patterns for sending site keys and target URLs to third-party solving services such as2captcha.com, which involves transmitting data from the agent's environment to an external provider. - [CREDENTIALS_UNSAFE]: The
templates/authenticated-session.tsfile implements a session persistence pattern that saves raw session cookies to a localsession.jsonfile. If the local environment is shared or insecure, these cookies could be accessed by unauthorized users to hijack sessions. - [COMMAND_EXECUTION]: The skill includes a shell script
scripts/install-browsers.shwhich executes system commands (npx playwright install,playwright install) to download and install browser binaries and their system dependencies.
Audit Metadata