install-playwright-mcp

Warn

Audited by Snyk on Mar 10, 2026

Risk Level: MEDIUM
Full Analysis

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). This skill installs a Playwright MCP server and explicitly exposes browser automation tools (e.g., "browser_navigate", "browser_click", "browser_snapshot") and even instructs testing with "Navigate to google.com and take a snapshot" in SKILL.md, which means the agent can fetch and read arbitrary public web pages (untrusted third‑party content) that can influence its subsequent actions.

MEDIUM W012: Unverifiable external dependency detected (runtime URL that controls agent).

  • Potentially malicious external URL detected (high risk: 1.00). The skill installs and runs remote code at runtime via the command "npx @playwright/mcp@latest", which downloads and executes an external package required for the MCP server, so this is a runtime fetch that executes remote code (flagged: npx @playwright/mcp@latest).
Audit Metadata
Risk Level
MEDIUM
Analyzed
Mar 10, 2026, 06:49 AM