Playwright MCP — security audit
Playwright MCP: trust score 80/100 — 3 capability surfaces.
Trust score
80
Grade B
Capability surface
Process spawn
Medium riskLaunches subprocesses via docker, npx, uvx — supply-chain risk if package is compromised.
Evidence:
npxOutbound network
Medium riskCalls external APIs (GitHub, Slack, Stripe, etc.). Data leaves the machine.
Evidence:
apiBrowser automation
High riskDrives a real browser (Playwright, Puppeteer). Can scrape any logged-in service.
Evidence:
playwrightpuppeteerchromiumbrowser automation
Trust signals
Total trust score is the sum of these contributions. Each signal carries a fixed weight.
Verified by Loadout
+20 / 20
Manually verified.
Official author
+15 / 15
Maintained by the official Microsoft team.
Community traction
+20 / 20
11,800 GitHub stars.
Public source
+15 / 15
Source is publicly auditable.
Stability
+0 / 15
Stability not yet assessed.
Capability surface
+10 / 15
1 high-risk capability detected.
Disclaimer
This is an automated heuristic triage. It does not replace a hand-rolled code audit. Use it to prioritise which servers deserve a deeper look — especially anything carrying high-risk capabilities like shell execution or filesystem write.