High-risk tools in Playwright Stealth
3 of the 6 tools in Playwright Stealth are classified as high risk. This page profiles those tools specifically, with recommended policy actions and the attack patterns that target them.
Every operation listed below is an action PolicyLayer recommends controlling at the transport layer. Open any tool to see the full profile, risk score, and YAML policy snippet.
Tools at high risk
-
browser_executeExecute 4/5Execute Playwright code in the browser. This tool runs JavaScript code with access to a Playwright `page` object. The browser session persists across calls, so you can navigate...
-
browser_start_recordingExecute 3/5Start recording the browser session as a video. This tool begins capturing all browser interactions as a WebM video file. It works by recycling the browser context with video r...
-
browser_stop_recordingExecute 3/5Stop recording the browser session and save the video. This tool stops the active video recording, saves the video file, and returns a resource URI for the recorded video. **S...
Attacks that target this class
High-risk tools in any server share these documented attack patterns. Each links to the full case and the defensive policy.
More on Playwright Stealth
Enforce policy on Playwright Stealth
One command generates a policy scaffold for every server in your MCP config.
npx -y @policylayer/intercept init