browser-automation
Pass
Audited by Gen Agent Trust Hub on Mar 21, 2026
Risk Level: SAFEPROMPT_INJECTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADS
Full Analysis
- [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection. \n
- Ingestion points: Data from untrusted external websites is ingested via
playwright_navigateandplaywright_extract_content. \n - Boundary markers: No specific delimiters or instructions are provided to the agent to distinguish between user commands and content found on the web. \n
- Capability inventory: High-impact tools such as
playwright_click,playwright_fill, andplaywright_evaluatecould be triggered or manipulated by malicious website content. \n - Sanitization: There is no documentation of sanitization or filtering of content retrieved from the browser before it is processed by the AI. \n- [COMMAND_EXECUTION]: The tool
playwright_evaluateenables the execution of arbitrary JavaScript within the browser context. This allows for manipulation of page state and access to all data present in the browser's Document Object Model (DOM). \n- [DATA_EXFILTRATION]: Tools likeplaywright_screenshotandplaywright_extract_contentallow for the extraction of sensitive information from any URL accessible to the browser, which could include internal network resources if the execution environment is not isolated. \n- [EXTERNAL_DOWNLOADS]: The skill references the official Microsoft Playwright MCP server repository on GitHub as the source for its automation capabilities.
Audit Metadata