vscode-playwright
Audited by Socket on Mar 12, 2026
1 alert found:
Obfuscated FileThe skill's stated purpose to automate VS Code screenshot capture using Playwright MCP tools is broadly coherent with its implemented workflow: it manages a local server, seeds ephemeral settings, drives the UI, and captures screenshots. The footprint is proportionate and does not display obvious credential access or external data exfiltration. However, there is a notable supply-chain concern around downloading and proxying binaries (serve-web and the VS Code Server) without explicit, verifiable source references or checksums. This warrants cautious deployment and verification of binary sources before use. Overall, the skill is BENIGN with elevated caution (SUSPICIOUS if binaries are unverifiable).