Back to skill
Skillv1.0.0

ClawScan security

Playwright Cli Skills · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 14, 2026, 10:27 AM
Verdict
Benign
Confidence
medium
Model
gpt-5-mini
Summary
The skill's files and runtime instructions are consistent with a Playwright CLI automation/testing helper (including an Amazon scraping helper); it performs local browser automation and writes files to the user's home directory but does not request unrelated credentials or download remote code.
Guidance
This skill appears to do what it says: automate Playwright-driven browser interactions and includes an Amazon scraping helper. Before installing or running it, consider: 1) Playwright CLI and Node must already be installed on your machine. 2) The amazon-search scripts load a local storage-state/auth file (e.g., ~/amazon-auth.json or a project-specific path) and will use cookies/storage from it — those files can contain session tokens; only use auth state you trust and remove it after use. 3) The skill and its docs expose run-code and routing features that can execute arbitrary JS in pages and capture network/request bodies and cookies (use isolated browser sessions or a throwaway profile if you are concerned). 4) The included scripts run local shell commands and write CSV/traces to your home directory; review the JS and shell files before running them and run in a sandboxed account or VM if you need extra safety. If you want, I can point out the exact lines that load auth files, execute shell commands, and write output so you can review them quickly.

Review Dimensions

Purpose & Capability
okName/description (Playwright CLI automation & testing) match the provided SKILL.md, reference docs, and example scripts. The included amazon-search scripts use playwright-cli to open pages, load storage state, extract data, and write CSV output — all expected for a browser automation scraping helper.
Instruction Scope
noteThe SKILL.md and reference docs allow and document powerful operations: run-code (arbitrary JS in the page), loading/saving storage state, cookie/localStorage manipulation, recording traces (which include network bodies), and routing/removing headers (including cookie/authorization). Those are legitimate and expected capabilities for a Playwright/testing skill, but they also let the skill access and persist sensitive data (cookies, tokens, page content) and execute arbitrary page JS—so operators should understand those capabilities before use.
Install Mechanism
okNo install spec is present (instruction-only). The skill does not pull code from remote URLs or install packages itself. Risk is limited to running local binaries (playwright-cli, node) which the user must already install.
Credentials
noteThe skill declares no required env vars or credentials. Scripts use HOME and optional DEBUG env var to locate/read/write files (e.g., an auth state file and CSV output under the user's home). The Amazon scripts expect a saved auth state file; this is coherent but means the skill will access local storage-state files containing cookies/tokens if present.
Persistence & Privilege
okalways is false and the skill does not request to modify other skills or system-wide agent settings. It runs commands that create files under the user's home (auth state, CSV output, traces) which is normal for automation scripts.