71
grade C
11 days ago
glama

MCP Playwright Browser

Exposes Playwright-powered automation tools to AI assistants for navigating web pages, interacting with elements, and extracting structured data. It features specialized scrapers for Indeed and Google Search, along with stealth mode to bypass bot detection.

Install from

M8ven verifies MCPs across every public registry — install directly from whichever one you prefer.

// key findings
⚠️
Tool descriptions don’t match what handlers do
1 tool describes read intent but its handler mutates — browser.get_network_request (line 4197: fs.writeFile(abs, String(payload.body), 'utf8'))
⚠️
Known vulnerabilities in dependencies: 1 high
Affects packages this MCP installs at runtime. Upgrade or remove the affected dependency.
No credential exfiltration, no sensitive file access, no obfuscation
Static analysis found nothing flowing your secrets to unexpected places.
Open source with a license and README
Anyone can audit the code, the license is declared, and the publisher documents what it does.
// required environment variables
This server reads these from process.env. You'll be asked to provide them before it can run.
configHEADFUL
configJOB_AUTOMATION_BASE_DIR
configMCP_WORKSPACE_DIR
configPROGRAMFILES
configPROGRAMFILES(X86)
// full audit trail
The full breakdown of what we checked, the deductions that landed, the network hosts, the dependency advisories, and concrete fix guidance is available to verified publishers.
// improvement guidance — verified publishers only
We have 6 concrete improvements we can share with the publisher of this MCP. Each comes with specific guidance to raise the trust score.
// embed badge in your README
[![M8ven Score](https://m8ven.ai/badge/mcp/mhrnqaruni-mcp-playwright-browser-spxrrw)](https://m8ven.ai/mcp/mhrnqaruni-mcp-playwright-browser-spxrrw)
commit: a370016d127a2718d7378ebee8ba99b37ffc7261
code hash: 562136e1fb6299fc2cb40dae7231742687d36404c0f12956a80e0f925efd9c0d
verified: 4/11/2026, 3:11:19 PM
view raw JSON →