New Research: Supply Chain Attack on Axios Pulls Malicious Dependency from npm.Details
Socket
Book a DemoSign in
Socket

@playwright/cli

Package Overview
Dependencies
Maintainers
4
Versions
15
Alerts
File Explorer

Advanced tools

Socket logo

Install Socket

Detect and block malicious and high-risk dependencies

Install

@playwright/cli - npm Package Compare versions

Comparing version
0.0.65
to
0.0.66
+3
-3
package.json
{
"name": "@playwright/cli",
"version": "0.0.65",
"version": "0.0.66",
"description": "Playwright CLI",

@@ -24,4 +24,4 @@ "repository": {

"minimist": "^1.2.5",
"playwright": "1.59.0-alpha-1770338664000",
"playwright-core": "1.59.0-alpha-1770338664000"
"playwright": "1.59.0-alpha-1770400094000",
"playwright-core": "1.59.0-alpha-1770400094000"
},

@@ -28,0 +28,0 @@ "bin": {

+14
-28

@@ -67,29 +67,2 @@ # playwright-cli

### Skills-less operation
Point your agent at the CLI and let it cook. It'll read the skill off `playwright-cli --help` on its own:
```
Test the "add todo" flow on https://demo.playwright.dev/todomvc using playwright-cli.
Check playwright-cli --help for available commands.
```
### Installing skills
Claude Code, GitHub copilot and others will let you install the Playwright skills into the agentic loop.
#### plugin (recommended)
```bash
/plugin marketplace add microsoft/playwright-cli
/plugin install playwright-cli
```
#### manual
```bash
mkdir -p .claude/skills/playwright-cli
curl -o .claude/skills/playwright-cli/SKILL.md \
https://raw.githubusercontent.com/microsoft/playwright-cli/main/skills/playwright-cli/SKILL.md
```
## Headed operation

@@ -141,3 +114,4 @@

```bash
playwright-cli open <url> # open url
playwright-cli open [url] # open browser, optionally navigate to url
playwright-cli goto <url> # navigate to a url
playwright-cli close # close the page

@@ -484,1 +458,13 @@ playwright-cli type <text> # type text into editable element

</details>
## Specific tasks
The installed skill includes detailed reference guides for common tasks:
* **Request mocking** — intercept and mock network requests
* **Running Playwright code** — execute arbitrary Playwright scripts
* **Browser session management** — manage multiple browser sessions
* **Storage state (cookies, localStorage)** — persist and restore browser state
* **Test generation** — generate Playwright tests from interactions
* **Tracing** — record and inspect execution traces
* **Video recording** — capture browser session videos