playwright-cli
Fail
Audited by Snyk on Feb 16, 2026
Risk Level: HIGH
Full Analysis
HIGH W007: Insecure credential handling detected in skill instructions.
- Insecure credential handling detected (high risk: 1.00). The prompt contains examples and commands that embed secrets and credentials verbatim (e.g., cookie-set session_id abc123, fill e2 "password123"), so an agent following it would need to include secret values directly in generated commands or outputs.
MEDIUM W011: Third-party content exposure detected (indirect prompt injection risk).
- Third-party content exposure detected (high risk: 1.00). The skill automates a real browser and accepts arbitrary URLs (e.g., "playwright-cli open", "playwright-cli goto", "tab-new https://...") and commands that read page content (e.g., eval "el => el.textContent", snapshot), so it clearly fetches and interprets untrusted public web content.
Audit Metadata