Playwright 网页自动化工具

v1.0.0

使用 Playwright 对本地网页、静态 HTML 或在线页面执行自动化测试、元素发现、控制台日志采集与截图。

0· 13·0 current·0 all-time
bycarpe@carpedx
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Pending
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Skill name/description align with code and instructions: it uses Python + Playwright to open URLs and file:// pages, take screenshots, discover elements, and capture console logs. Declared requirement (python3) matches. Included helper scripts (e.g., with_server.py) are coherent with the stated use case (start local services before automation).
Instruction Scope
Runtime instructions and run_task.py stay within the stated scope: they parse a URL or file:// path, open it in Playwright, capture screenshots/logs, and write outputs to an output directory. A notable implementation detail: scripts/with_server.py spawns arbitrary shell commands (subprocess.Popen(..., shell=True)) to start services and waits for ports — this is consistent with starting local dev servers but is a privileged operation if untrusted inputs are forwarded. The agent entrypoint runs scripts/run_task.py only, not with_server.py, so with_server.py is present but not invoked automatically by the agent entrypoint.
Install Mechanism
No automated install spec is included; SKILL.md instructs the user to pip install Playwright and run playwright install chromium. That manual instruction is expected and avoids the skill fetching arbitrary binaries itself.
Credentials
The skill requests no environment variables or credentials. It writes outputs to OPENCLAW_OUTPUT_DIR or /tmp by default. There are no requests for unrelated secrets or system config paths.
Persistence & Privilege
always is false and the skill does not attempt to modify other skills or system-wide agent configuration. It creates output files under /tmp or OPENCLAW_OUTPUT_DIR, which is appropriate for this functionality.
Assessment
This package is internally consistent for local/remote page automation, but take these precautions before installing or running it: - Install Playwright and Chromium via the recommended commands in a controlled environment (virtualenv or container). - Be careful when navigating untrusted remote pages: Playwright executes page JavaScript and allows network requests, so visiting unknown URLs can expose sensitive data or cause unexpected network activity. - The repository includes scripts/with_server.py which will run arbitrary shell commands (uses shell=True). Only use with_server.py with trusted commands and inputs; avoid passing untrusted strings to --server to prevent shell injection. - Outputs are written to /tmp by default; if those files may contain sensitive screenshots or logs, set OPENCLAW_OUTPUT_DIR to a secure location. - If you need tighter security, run the skill in an isolated environment (container, VM) and review any commands the agent will execute before allowing agent-driven automation.

Like a lobster shell, security has layers — review code before you run it.

automationvk97d36w5v2q3kjmvn5b6gb3z9h84fwgclatestvk97d36w5v2q3kjmvn5b6gb3z9h84fwgcplaywrightvk97d36w5v2q3kjmvn5b6gb3z9h84fwgcscreenshotvk97d36w5v2q3kjmvn5b6gb3z9h84fwgcuivk97d36w5v2q3kjmvn5b6gb3z9h84fwgcweb-testingvk97d36w5v2q3kjmvn5b6gb3z9h84fwgc

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binspython3

Comments