playwright-cli
Warn
Audited by Gen Agent Trust Hub on Feb 24, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTIONEXTERNAL_DOWNLOADS
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
run-codecommand facilitates the execution of arbitrary Playwright scripts. Analysis ofreferences/running-code.mdconfirms this can be used to interact with the local file system (e.g.,download.saveAs) and manage browser-level permissions. - [DATA_EXFILTRATION]: Dedicated commands like
cookie-get,localstorage-get, andstate-saveprovide direct access to sensitive browser state and authentication tokens. The skill includes security notes advising users not to commit these state files to version control. - [COMMAND_EXECUTION]: The
evalcommand enables arbitrary JavaScript execution within the browser's page context, allowing for DOM manipulation and data extraction. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. 1. Ingestion points: Untrusted data enters the context via
openandsnapshotcommands. 2. Boundary markers: None are specified in the usage documentation. 3. Capability inventory: The skill has high-risk capabilities includingrun-codeandeval. 4. Sanitization: No content sanitization or validation is described for ingested web data. - [EXTERNAL_DOWNLOADS]: The
install-browsercommand performs network downloads of browser binaries from official sources. This is a standard setup procedure for the Playwright framework.
Audit Metadata