playwright-cli

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt contains examples and commands that embed secrets and credentials verbatim (e.g., cookie-set session_id abc123, fill e2 "password123"), so an agent following it would need to include secret values directly in generated commands or outputs.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill explicitly opens and navigates arbitrary external URLs (e.g., playwright-cli open / playwright-cli goto) and includes examples of scraping and returning page content via run-code (e.g., "scrape data from multiple pages", page.content(), page.evaluate()), so the agent will read and interpret untrusted public web pages and user-generated content.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 03:39 AM