playwright-excel
Warn
Audited by Gen Agent Trust Hub on Feb 17, 2026
Risk Level: MEDIUMEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONREMOTE_CODE_EXECUTION
Full Analysis
- [EXTERNAL_DOWNLOADS] (LOW): The skill automatically downloads and executes the
@playwright/mcppackage from the NPM registry. - Evidence:
references/mcp-validation.mdcontains commands to start the MCP server:npx @playwright/mcp@latest(Linux/WSL) andcmd /c npx @playwright/mcp@latest(Windows). - Mitigation: Although
@playwrightis a known scope, using@latestcan lead to non-deterministic execution. Pinning versions would be safer. - [COMMAND_EXECUTION] (MEDIUM): The skill executes various system commands to manage the environment and run generated code.
- Evidence:
SKILL.mdinstructs the agent to runconda run -n playwright pythonandconda run -n playwright pip installfor missing dependencies. - [REMOTE_CODE_EXECUTION] (MEDIUM): The skill performs dynamic code generation by modifying existing Playwright scripts with data loaded from Excel files, then executes the result.
- Evidence:
SKILL.mdworkflow steps 5 (Modify the Playwright script) and 8 (Run the updated script) describe this process. - Risk: If the Excel file (untrusted input) contains malicious strings that are improperly escaped during the script modification phase, it could lead to arbitrary code execution in the local Python environment.
- [PROMPT_INJECTION] (LOW): The skill is susceptible to indirect prompt injection via the processed Excel data.
- Evidence:
references/excel-loading.mdreads and filters data from arbitrary Excel sheets. - Mandatory Evidence Chain:
1. Ingestion points:
.xlsxfiles provided at runtime. 2. Boundary markers: Absent; data is interpolated directly into script patterns. 3. Capability inventory: Subprocess calls (npx,conda), file-write (updating scripts), and network ops (via Playwright). 4. Sanitization: Absent; the loader does not validate or sanitize the cell content before script interpolation.
Audit Metadata