This Playwright skill enables arbitrary code execution, data
Claims to do
When to Use: Use this skill for real browser tasks: JS-rendered pages, multi-step forms, screenshots or PDFs, UI debugging, Playwright test authoring, MCP-driven browser control, and structured extraction from rendered pages.
Actually does
This skill executes Playwright commands via `npx` to automate browser tasks. It can navigate, click, fill forms, take screenshots/PDFs, extract data, and generate Playwright code. It contacts user-specified web origins for automation and `https://registry.npmjs.org` for optional package installation.
openclaw skills install ivangdavila/playwrightThe skill explicitly uses `npx` and `node` for executing Playwright commands and JavaScript, allowing for arbitrary code execution if the agent is prompted to run malicious scripts or if the installed packages are compromised.
npx @playwright/mcp --headless
npx playwright test
const { chromium } = require('playwright');The skill lists `browser_evaluate` as a common MCP action, enabling arbitrary JavaScript execution within the context of the browsed page, which can be used for data extraction or DOM manipulation.
`browser_evaluate` for inspection and extraction
The skill installs `playwright` and `@playwright/mcp` via `npm`. A compromise of these packages or their dependencies could lead to the execution of malicious code during installation or subsequent use.
install":[{"id":"npm-playwright","kind":"npm","package":"playwright"},{"id":"npm-playwright-mcp","kind":"npm","package":"@playwright/mcp"}]The skill's core function involves interacting with and extracting data (e.g., form input, cookies, page content) from user-requested web origins, which could be abused to exfiltrate sensitive information to attacker-controlled domains.
description: "extract data" External Endpoints: User-requested web origins | Browser requests, form input, cookies, uploads, and page interactions required by the task
Browser automation can be resource-intensive. An attacker could craft prompts to initiate numerous browser instances or complex, long-running tasks, potentially leading to resource exhaustion on the host system.
description: "Browser automation via Playwright MCP." npx @playwright/mcp --headless
The skill explicitly requires user confirmation for 'high-stakes flows,' implying that less critical, but still potentially sensitive, actions might proceed without explicit human approval, which could lead to approval fatigue or oversight bypass.
For destructive, financial, medical, production, or otherwise high-stakes flows, prefer staging or local environments and require explicit user confirmation before continuing.
[](https://mondoo.com/ai-agent-security/skills/clawhub/ivangdavila/playwright)<a href="https://mondoo.com/ai-agent-security/skills/clawhub/ivangdavila/playwright"><img src="https://mondoo.com/ai-agent-security/api/badge/clawhub/ivangdavila/playwright.svg" alt="Mondoo Skill Check" /></a>https://mondoo.com/ai-agent-security/api/badge/clawhub/ivangdavila/playwright.svgSkills can read files, run commands, and access credentials. Mondoo helps organizations manage the security risks of AI agent skills across their entire fleet.