playwright-cli

Fail

Audited by Snyk on Apr 12, 2026

Risk Level: HIGH
Full Analysis

HIGH W007: Insecure credential handling detected in skill instructions.

  • Insecure credential handling detected (high risk: 1.00). The prompt includes commands and examples that embed secrets (e.g., cookies, passwords) directly as CLI arguments (e.g., cookie-set session_id abc123, fill e2 "password123"), which would require the LLM to output secret values verbatim when performing those actions.

MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).

  • Third-party content exposure detected (high risk: 0.90). The skill's CLI explicitly navigates and scrapes arbitrary public websites (e.g., "playwright-cli goto https://..." in SKILL.md) and its references (references/running-code.md and references/request-mocking.md) show examples that fetch page.content(), scrape multiple pages, and run arbitrary page-evaluated code, meaning untrusted third-party web content is ingested and can influence subsequent actions.

Issues (2)

W007
HIGH

Insecure credential handling detected in skill instructions.

W011
MEDIUM

Third-party content exposure detected (indirect prompt injection risk).

Audit Metadata
Risk Level
HIGH
Analyzed
Apr 12, 2026, 11:00 PM
Issues
2