Playwright.Tmp
PassAudited by ClawScan on May 1, 2026.
Overview
This is a coherent Playwright browser-automation guide with no included executable code, but it can drive real websites and handle sessions, screenshots, downloads, and test artifacts.
This skill appears safe to install as an instruction-only Playwright helper. Before using it, verify any npm/npx packages, keep browser automation scoped to the requested site or app, avoid using privileged real accounts unless necessary, confirm before submissions or uploads, and protect any screenshots, traces, videos, downloads, or saved auth files it creates.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
An agent using this skill could interact with logged-in websites or upload local files as part of a user-requested browser workflow.
The skill intentionally exposes broad browser actions, including clicking, typing, evaluating page JavaScript, and choosing files for upload. This is expected for Playwright automation, but it can submit forms, extract page data, or upload files if used on real sites.
Typical Playwright MCP tool actions include: ... `browser_click` ... `browser_type` ... `browser_evaluate` ... `browser_choose_file`
Use it on clearly scoped sites and require explicit user confirmation before submitting forms, making purchases, changing account settings, uploading files, or performing other irreversible actions.
Running the command may download and execute package code from the npm ecosystem on the user's machine.
The documented quick start runs an npm package through npx without a pinned version. This is a normal Playwright MCP setup path, but it means the package resolved at run time should be trusted.
```bash npx @playwright/mcp --headless ```
Verify the package name and publisher, prefer pinned versions in controlled environments, and run setup commands only in an appropriate project or sandboxed development environment.
If reused carelessly, a saved auth file could let browser tests or automation act as an existing user account.
The testing guidance includes optional saved browser authentication state. The surrounding text appropriately limits reuse, but stored sessions can carry account privileges.
Persist auth only when the suite already standardizes that pattern and the stored state is safe to reuse. const authFile = 'playwright/.auth/user.json';
Use dedicated test accounts, avoid privileged or personal sessions, keep auth files out of source control, and reuse saved sessions only when the project intentionally standardizes that pattern.
Failure artifacts could expose private UI data, test credentials shown on screen, or downloaded content to anyone with CI artifact access.
The CI guidance stores Playwright reports, traces, screenshots, and videos as artifacts. This is standard for debugging, but those artifacts may preserve sensitive rendered page content.
path: playwright-report/ retention-days: 7 ... trace: 'on-first-retry', screenshot: 'only-on-failure', video: 'on-first-retry'
Restrict CI artifact access, avoid real secrets in browser tests, redact sensitive data where possible, and keep retention periods short.
