replay-playwright
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- EXTERNAL_DOWNLOADS (MEDIUM): The skill installs the Replay browser via
npx replayio installand requires the@replayio/playwrightpackage. These are external dependencies not included in the trusted source list. - REMOTE_CODE_EXECUTION (MEDIUM): The skill instructs the user to configure a remote MCP server located at
https://dispatch.replay.io/nut/mcp. This allows an external service to influence agent behavior through tool definitions. - COMMAND_EXECUTION (LOW): Multiple commands are executed via
Bashtools (npm,npx,yarn,pnpm,bun) to install software and run tests. - DATA_EXFILTRATION (LOW): The
REPLAY_API_KEYis passed in an Authorization header to the Replay dispatch URL. While this is necessary for the service's functionality, it involves the transmission of sensitive credentials to a non-whitelisted domain. - INDIRECT_PROMPT_INJECTION (LOW):
- Ingestion points: The agent receives data from the
mcp__replaytool output. - Boundary markers: No specific delimiters or safety instructions are provided to the agent for processing the remote tool's output.
- Capability inventory: The skill has broad execution capabilities through the permitted
Bashtool variants. - Sanitization: There is no explicit sanitization logic for data returned from the MCP server.
Audit Metadata