browsing-with-playwright

Fail

Audited by Snyk on Feb 16, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The skill's examples and commands require embedding form field values (e.g., "password123") into JSON parameters sent to the Playwright MCP, so an agent would need to output plaintext secrets verbatim in its generated requests/commands.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 1.00). The skill uses a Playwright MCP browser to navigate arbitrary URLs and extract page content (see browser_navigate, browser_snapshot, browser_run_code in references/playwright-tools.md and the mcp-client.py examples), which clearly ingests untrusted public web content that the agent is expected to read and interpret.
Audit Metadata
Risk Level
HIGH
Analyzed
Feb 16, 2026, 12:37 PM