browsing-with-playwright
Fail
Audited by Gen Agent Trust Hub on Feb 21, 2026
Risk Level: HIGHEXTERNAL_DOWNLOADSREMOTE_CODE_EXECUTIONCOMMAND_EXECUTION
Full Analysis
- [External Downloads] (HIGH): The
scripts/start-server.shfile usesnpx @playwright/mcp@latest. This command downloads and executes the most recent version of an external package from the npm registry without version pinning or integrity checks. - [Remote Code Execution] (HIGH): The
browser_run_codetool (documented inSKILL.md) allows for the execution of arbitrary JavaScript functions within the server context. An attacker could use this to execute malicious code on the host system via the browser automation framework. - [Command Execution] (MEDIUM): The skill relies on shell scripts (
start-server.sh,stop-server.sh) that wrap various system commands likenpx,pkill, andpython3to manage background processes. - [Indirect Prompt Injection] (LOW): The skill is designed to scrape and interact with web content. It is vulnerable to instructions hidden in websites that could be interpreted by the agent. 1. Ingestion points: Web content retrieved via
browser_snapshotandbrowser_evaluateinSKILL.md. 2. Boundary markers: None identified. 3. Capability inventory: Arbitrary JS execution (browser_run_code), navigation, and interaction inSKILL.md. 4. Sanitization: None identified.
Recommendations
- AI detected serious security threats
Audit Metadata