playwright
Warn
Audited by Gen Agent Trust Hub on Apr 9, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONEXTERNAL_DOWNLOADSCOMMAND_EXECUTIONDATA_EXFILTRATIONPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The
run.jsscript implements a dynamic execution engine that accepts JavaScript code from files, arguments, or standard input, wraps it in a template, and executes it using Node.js dynamicimport(). This allows the agent to execute arbitrary logic on the local system. - [EXTERNAL_DOWNLOADS]: The
package.jsonandrun.jsfiles contain instructions to download and install Node.js packages from the npm registry and browser binaries from Microsoft's official infrastructure during setup. - [COMMAND_EXECUTION]: The skill uses
execSyncto run shell commands for environment configuration and dependency management, specifically for runningnpmorbunand the Playwright CLI to install browsers. - [DATA_EXFILTRATION]: The browser automation capabilities allow for programmatic navigation and data extraction from any URL. The
link-checker.jsexample demonstrates performing network requests to arbitrary external endpoints, which could be misused for unauthorized scanning. - [PROMPT_INJECTION]: The skill is susceptible to indirect prompt injection when processing untrusted web data.
- Ingestion points: Data is extracted from web pages via
lib/helpers.js(text and table extraction) andexamples/link-checker.js(URL extraction). - Boundary markers: No delimiters or special instructions are present to differentiate untrusted web content from agent instructions.
- Capability inventory: The skill environment possesses high-privilege capabilities including file system access and dynamic code execution via
run.js. - Sanitization: No validation or sanitization of external web content is performed before it enters the agent's context.
Audit Metadata