Dangerous exec
- Finding
- Shell command execution detected (child_process).
Security checks across static analysis, malware telemetry, and agentic risk
Prompt-injection indicators were detected in the submitted artifacts (system-prompt-override, base64-block, unicode-control-chars); human review is required before treating this skill as clean.
Install only if you want the agent to control web browsers through Playwright. Treat it like any browser automation tool: use it on intended sites, be careful with logged-in accounts and form submissions, and review the bundled virtual environment because the package source is unknown. ClawScan detected prompt-injection indicators (system-prompt-override, base64-block, unicode-control-chars), so this skill requires review even though the model response was benign.
No VirusTotal findings for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent can launch a browser, navigate to websites, collect page content, and save screenshots as part of a task.
The skill intentionally relies on local command execution to drive browser automation. That is expected for Playwright, but users should recognize that the agent can run these commands when using the skill.
This skill is designed for programmatic interaction via `exec` commands, typically orchestrated by an agent.
Use it only for websites and actions you intend the agent to automate, and avoid letting it submit forms or perform account-changing actions unless explicitly requested.
Browser-page scripts could be run during automation, which may change page state or interact with sensitive web applications if used on logged-in sites.
The skill advertises browser-context JavaScript execution. This is normal for advanced Playwright debugging, but it is still a sensitive automation capability.
- Execute custom JavaScript within the browser context.
Keep JavaScript execution tied to explicit debugging or testing tasks, and avoid running arbitrary scripts on sensitive or logged-in pages.
Installing the skill means trusting bundled dependency code, not just a short instruction file.
The skill includes a helper script plus a bundled Python virtual environment with large third-party dependencies. These dependencies are expected for Playwright, but the source is unknown and there is no install spec to explain provenance.
scripts/playwright_cli.py ... venv/lib/python3.14/site-packages/playwright/ ... venv/lib/python3.14/site-packages/pip/
Prefer a version with clear source provenance, pinned dependency versions, and a documented installation process, or inspect the bundled environment before use.