browsing-with-playwright

skills-sh:bilalmk_todo_correct__browsing-with-playwright

View source
B
84/100

First Seen

Feb 19, 2026

Last Scanned

Feb 20, 2026

Findings

8

Score

84/100

MEDIUM 2
LOW 6

Findings (8)

MEDIUM
MCP code execution tool
L109

Detects MCP tools that execute arbitrary code

run_code
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

MEDIUM
MCP code execution tool
L116

Detects MCP tools that execute arbitrary code

run_code
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
Shell script file execution
L19

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/start-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L28

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/stop-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Non-localhost remote MCP server URL
L49

Detects MCP server configurations connecting to non-localhost remote URLs

"url": "https://example.com"
FIX

Change the MCP server URL to localhost or a trusted internal endpoint. If a remote server is required, verify the domain ownership and use HTTPS with certificate validation.

FP?

Likely FP if the URL points to example.com, a documentation domain, or a well-known SaaS API endpoint (e.g., api.openai.com).

LOW
MCP code execution tool
L112

Detects MCP tools that execute arbitrary code

run_code
FIX

Restrict code execution tools to specific languages and sandbox the runtime environment. Use a container or VM-based sandbox instead of running code directly on the host.

FP?

Likely FP if the MCP tool is a dedicated code runner (e.g., Jupyter kernel) with documented sandboxing and no network access.

LOW
Shell script file execution
L144

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/start-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.

LOW
Shell script file execution
L159

Detects execution of shell script files via bash/sh command or direct invocation

bash scripts/stop-server.sh
FIX

Replace direct shell script execution with a language-native implementation or a sandboxed executor. If shell scripts must run, restrict them to a vetted allowlist with integrity checks.

FP?

Likely FP if the match references running a script that is part of the skill's own repository (e.g., ./setup.sh) with clear, auditable contents.