playwright-skill

Warn

Audited by Socket on Mar 31, 2026

1 alert found:

Security
SecurityMEDIUM
scripts/run.js

This module is not visibly obfuscated and does not contain explicit malware logic in the shown code. However, it is a high-risk arbitrary JavaScript execution harness: it accepts externally provided code (file/stdin/inline) and executes it via require() from a generated temp module, with Node-level privileges. It also auto-runs npm install and Playwright browser installation when missing, increasing supply-chain/network exposure. Additionally, it injects environment-derived extraHTTPHeaders into Playwright usage when user code does not include its own require(), which could contribute to sensitive data leakage depending on helper behavior and the executed script.

Confidence: 71%Severity: 84%
Audit Metadata
Analyzed At
Mar 31, 2026, 07:09 PM
Package URL
pkg:socket/skills-sh/nordz0r%2Fskills%2Fplaywright-skill%2F@8f1241f115c17cd2dd423a1585d71343118b9d23