Playwright.Tmp

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: playwright-tmp Version: 1.0.0 The skill bundle provides a comprehensive and safe set of instructions for browser automation using Playwright and Playwright MCP. It includes detailed documentation for testing, debugging, and scraping, while explicitly enforcing security best practices such as requiring user confirmation for high-stakes production flows and avoiding session persistence by default. No indicators of malicious intent, data exfiltration, or unauthorized execution were found across the files (SKILL.md, ci-cd.md, etc.).

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could interact with logged-in websites or upload local files as part of a user-requested browser workflow.

Why it was flagged

The skill intentionally exposes broad browser actions, including clicking, typing, evaluating page JavaScript, and choosing files for upload. This is expected for Playwright automation, but it can submit forms, extract page data, or upload files if used on real sites.

Skill content
Typical Playwright MCP tool actions include: ... `browser_click` ... `browser_type` ... `browser_evaluate` ... `browser_choose_file`
Recommendation

Use it on clearly scoped sites and require explicit user confirmation before submitting forms, making purchases, changing account settings, uploading files, or performing other irreversible actions.

What this means

Running the command may download and execute package code from the npm ecosystem on the user's machine.

Why it was flagged

The documented quick start runs an npm package through npx without a pinned version. This is a normal Playwright MCP setup path, but it means the package resolved at run time should be trusted.

Skill content
```bash
npx @playwright/mcp --headless
```
Recommendation

Verify the package name and publisher, prefer pinned versions in controlled environments, and run setup commands only in an appropriate project or sandboxed development environment.

What this means

If reused carelessly, a saved auth file could let browser tests or automation act as an existing user account.

Why it was flagged

The testing guidance includes optional saved browser authentication state. The surrounding text appropriately limits reuse, but stored sessions can carry account privileges.

Skill content
Persist auth only when the suite already standardizes that pattern and the stored state is safe to reuse.

const authFile = 'playwright/.auth/user.json';
Recommendation

Use dedicated test accounts, avoid privileged or personal sessions, keep auth files out of source control, and reuse saved sessions only when the project intentionally standardizes that pattern.

What this means

Failure artifacts could expose private UI data, test credentials shown on screen, or downloaded content to anyone with CI artifact access.

Why it was flagged

The CI guidance stores Playwright reports, traces, screenshots, and videos as artifacts. This is standard for debugging, but those artifacts may preserve sensitive rendered page content.

Skill content
path: playwright-report/
retention-days: 7
...
trace: 'on-first-retry',
screenshot: 'only-on-failure',
video: 'on-first-retry'
Recommendation

Restrict CI artifact access, avoid real secrets in browser tests, redact sensitive data where possible, and keep retention periods short.