electron-playwright-cli
Warn
Audited by Gen Agent Trust Hub on Mar 9, 2026
Risk Level: MEDIUMREMOTE_CODE_EXECUTIONCOMMAND_EXECUTIONDATA_EXFILTRATIONCREDENTIALS_UNSAFEPROMPT_INJECTION
Full Analysis
- [REMOTE_CODE_EXECUTION]: The skill provides
run-codeandelectron_evaluatecommands which allow for the execution of arbitrary JavaScript. - The
electron_evaluatecommand is particularly high-risk as it executes code within the Electron main process, which typically has full Node.js integration and can interact with the host file system and execute shell commands. - The
run-codecommand allows execution of arbitrary logic in the renderer (browser) context, including network requests viafetchorXMLHttpRequest. - [COMMAND_EXECUTION]: The skill relies on the
electron-playwright-clibinary via Bash to interact with the system and manage Electron processes. - [DATA_EXFILTRATION]: The skill includes extensive tools for extracting data from the application, including:
cookie-getandcookie-listfor retrieving session cookies.localstorage-getandsessionstorage-getfor accessing storage data.screenshotfor capturing the visual state of the application.snapshotfor extracting the full DOM tree and application metadata.- [CREDENTIALS_UNSAFE]: The
state-savecommand persists the entire application state, including authentication tokens and session identifiers, to local files. The documentation warns against committing these files but the capability allows for the capture of sensitive credentials. - [PROMPT_INJECTION]: The skill is vulnerable to indirect prompt injection through several ingestion points:
- Ingestion points: Data enters the agent's context through
snapshot,eval, andrun-codeoutputs, which may contain untrusted content from the application or web pages being automated. - Boundary markers: There are no apparent boundary markers or instructions to treat data from the Electron app as untrusted.
- Capability inventory: The skill possesses high-privilege capabilities including Node.js execution via
electron_evaluate, file writes viascreenshotandstate-save, and broad network access via routing and browser execution. - Sanitization: No evidence of sanitization or validation of the content retrieved from the application before it is processed by the agent.
Audit Metadata