C42/100

puppeteer-mcp-server
mcp0.7.2This MCP server provides browser automation capabilities through Puppeteer, allowing interaction with both new browser instances and existing Chrome windows.
By merajmehrabi | 7 findings | Scanned 3/20/2026 | tooltrust-scanner/v0.1.11
1 Critical3 High3 Low
Security Findings (7)
- CriticalArbitrary Code Execution
puppeteer_evaluate:tool name or description implies arbitrary script/code execution (evaluate_script, execute javascript, etc.)
Rule: AS-006Fix: This tool can execute arbitrary code or shell commands on the host system. Remove it unless strictly required. If kept: (1) restrict access to trusted users/agents only, (2) require human approval before each invocation (Claude Desktop: set approval_required: true; other clients: enable equivalent confirmation), (3) use the most restrictive sandbox or read-only mode available, and (4) never expose this tool to untrusted input sources. - HighExcessive Permission Surface ×3
- puppeteer_connect_active_tab:tool declares network permission
- puppeteer_navigate:tool declares network permission
- puppeteer_evaluate:tool declares exec permission
Rule: AS-002Fix: Tool requests broad permissions (exec/fs/network). Validate input parameters using Enums where possible, and restrict file system operations to explicit allowed directories. - LowDoS Resilience — Missing Rate Limit / Timeout ×3
- puppeteer_connect_active_tab:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- puppeteer_navigate:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
- puppeteer_evaluate:tool performs network or execution operations but declares no rate-limit, timeout, or retry configuration
Rule: AS-011Fix: Declare explicit rate-limit, timeout, and retry configuration for all network and execution tools. Implement exponential back-off and surface resource state to the calling agent.
Scan this tool yourself
Reproduce this audit locally or block risky tools in CI.
Install once, then scan any MCP server:
$ curl -sfL https://raw.githubusercontent.com/AgentSafe-AI/tooltrust-scanner/main/install.sh | bash$ tooltrust-scanner scan --server "npx -y puppeteer-mcp-server"Adjust the package name if your npm registry name differs from the tool ID. View source
Add badge to your README
Copy this Markdown to show your ToolTrust grade on GitHub.
[](https://github.com/AgentSafe-AI/tooltrust-directory)