playwright-cli
Fail
Audited by Gen Agent Trust Hub on Mar 14, 2026
Risk Level: HIGHREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONEXTERNAL_DOWNLOADSPROMPT_INJECTIONCREDENTIALS_UNSAFE
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill features a
run-codecommand that executes arbitrary JavaScript strings within the browser context. The documentation demonstrates that this environment has access to Node.js built-in modules likefs, allowing the agent to read and write files on the host machine beyond the browser's sandbox. - Evidence: Examples in
request-mocking.mdandrunning-custom-code.mdshow usage ofrequire('fs')anddownload.saveAsto interact with local paths like/tmp/export.csv. - [COMMAND_EXECUTION]: The skill is configured to allow the agent to execute a wide range of browser automation tasks through the
playwright-clibinary using a Bash tool interface. - Evidence: The
allowed-toolssection inSKILL.mdspecifiesBash(playwright-cli:*). - [DATA_EXFILTRATION]: The skill provides numerous methods to extract sensitive information from the browser, including the ability to list and get cookies, localStorage, sessionStorage, and the system clipboard. This data can be saved to local files or processed by the agent.
- Evidence: Commands such as
cookie-list,localstorage-get, and clipboard reading examples instorage-and-auth.mdandrunning-custom-code.md. - [EXTERNAL_DOWNLOADS]: The skill requires the installation of browser binaries and configuration from external sources during its setup process.
- Evidence:
playwright-cli install-browserandplaywright-cli install --skillscommands described inSKILL.md. - [PROMPT_INJECTION]: As the skill is designed to navigate to and extract data from arbitrary third-party websites, it is inherently vulnerable to indirect prompt injection. Malicious content on visited pages could contain instructions aimed at manipulating the agent's behavior.
- Evidence: The core functionality described in
SKILL.mdinvolves opening and interacting with external URLs, creating an ingestion point for untrusted data. - [CREDENTIALS_UNSAFE]: The skill facilitates the management of authentication states by allowing session tokens and cookies to be saved to and loaded from unencrypted local JSON files.
- Evidence: The
state-saveandstate-loadcommands detailed instorage-and-auth.md.
Recommendations
- AI detected serious security threats
Audit Metadata