@puppeteer/browsers
npmIs @puppeteer/browsers safe to use?
The latest brin safety scan flagged @puppeteer/browsers v2.11.2 with risk indicators that warrant review. No known CVE vulnerabilities. Trust score: 75/100. Review the findings below before use. This is an automated assessment and may contain errors.
Install (safety-checked)
@puppeteer/browsers Has Warnings
Warnings detected due to potential concerns
0
0
0
Risk Indicators
- •Can spawn child processes
brin Recommendations
- →This package has warnings detected. Evaluate the specific concerns before proceeding.
Install with brin add @puppeteer/browsers to automatically apply these checks before installation.
This is an automated, point-in-time assessment and may contain errors. Findings are risk indicators, not confirmed threats. Security posture may change over time. Maintainers can dispute findings via the brin review process.
@puppeteer/browsers Capabilities & Permissions
What @puppeteer/browsers can access when installed. Review these capabilities before using with AI agents like Cursor, Claude Code, or Codex.
Network Access
This package makes network requests.
Filesystem Access
Reads and writes to the filesystem.
Process Spawning
This package can spawn child processes.
Environment Variables
Accesses the following environment variables.
AGENTS.md for @puppeteer/browsers
Good instructions lead to good results. brin adds @puppeteer/browsers documentation to your AGENTS.md so your agent knows how to use it properly—improving both safety and performance.
brin initVercel's research: 100% accuracy with AGENTS.md vs 53% without →
@puppeteer/browsers Documentation & Source Code
For the full @puppeteer/browsers README, API documentation, and source code, visit the official package registry.
Frequently asked questions about @puppeteer/browsers safety
Install (safety-checked)
Weekly Downloads
Version
2.11.2License
Apache-2.0Last Scanned
Trust Score
Capabilities
Connects to: archive.mozilla.org, bugzilla.mozilla.org, googlechromelabs.github.io...
Reads & Writes files
Spawns child processes
Accesses: CHROME_CONFIG_HOME, LOCALAPPDATA, XDG_CONFIG_HOME