Puppeteer MCP — security audit

Puppeteer MCP: trust score 63/100 — 2 capability surfaces.

Trust score

63

Grade C

Risk flags

  • Community-authored

    Maintained by Community. Confirm the repo and signing before installing.

Capability surface

  • Process spawn

    Medium risk

    Launches subprocesses via docker, npx, uvx — supply-chain risk if package is compromised.

    Evidence: npx

  • Browser automation

    High risk

    Drives a real browser (Playwright, Puppeteer). Can scrape any logged-in service.

    Evidence: playwrightpuppeteerheadlessbrowser-automation

Trust signals

Total trust score is the sum of these contributions. Each signal carries a fixed weight.

  • Verified by Loadout

    +20 / 20

    Manually verified.

  • Official author

    +0 / 15

    Maintained by community contributors.

  • Community traction

    +18 / 20

    4,100 GitHub stars.

  • Public source

    +15 / 15

    Source is publicly auditable.

  • Stability

    +0 / 15

    Stability not yet assessed.

  • Capability surface

    +10 / 15

    1 high-risk capability detected.

Disclaimer

This is an automated heuristic triage. It does not replace a hand-rolled code audit. Use it to prioritise which servers deserve a deeper look — especially anything carrying high-risk capabilities like shell execution or filesystem write.