install-playwright-mcp
Warn
Audited by Snyk on Mar 10, 2026
Risk Level: MEDIUM
Full Analysis
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 0.90). This skill installs a Playwright MCP server and explicitly exposes browser automation tools (e.g., "browser_navigate", "browser_click", "browser_snapshot") and even instructs testing with "Navigate to google.com and take a snapshot" in SKILL.md, which means the agent can fetch and read arbitrary public web pages (untrusted third‑party content) that can influence its subsequent actions.
MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).
- Potentially malicious external URL detected (high risk: 1.00). The skill installs and runs remote code at runtime via the command "npx @playwright/mcp@latest", which downloads and executes an external package required for the MCP server, so this is a runtime fetch that executes remote code (flagged: npx @playwright/mcp@latest).
Audit Metadata