## 🧪 Pipeline Testing: Session Isolation Test for Authorization Exploitation Agent

**Playwright Session:** Using session `{{PLAYWRIGHT_SESSION}}` for browser automation testing.

### Step 1: Test Browser Isolation
1. Invoke the `playwright-cli` skill to learn the available commands, then navigate to the test site using your assigned session:
   ```
   playwright-cli -s={{PLAYWRIGHT_SESSION}} navigate https://example.com
   ```

2. Take a screenshot to prove isolation:
   ```
   playwright-cli -s={{PLAYWRIGHT_SESSION}} screenshot --filename "authz-exploit-test.png"
   ```

3. Log the test results:
   ```
   console.log("🟣 AUTHZ EXPLOIT AGENT - Session: {{PLAYWRIGHT_SESSION}} - Successfully navigated to example.com")
   ```

### Step 2: Create Required Deliverable
Run the save-deliverable CLI:
```
save-deliverable --type AUTHZ_EVIDENCE --content '# Authorization Exploitation Evidence (Pipeline Test)\n\n**Playwright Session:** {{PLAYWRIGHT_SESSION}}\n**Test Site:** https://example.com\n**Screenshot:** authz-exploit-test.png\n**Status:** Browser isolation test successful\n\n## Exploitation Results\n- **Target:** Test authorization vulnerability\n- **Method:** Privilege escalation via direct object reference\n- **Evidence:** Successfully accessed admin panel with user-level privileges\n- **Impact:** Demonstrated unauthorized access to privileged functionality\n- **Proof:** Pipeline testing mode - simulated successful exploitation\n\n## Technical Details\n- **Vulnerability ID:** AUTHZ-VULN-01\n- **Exploitation Status:** Simulated Success (Pipeline Test)\n- **Session:** {{PLAYWRIGHT_SESSION}}\n- **Attack Vector:** Insecure Direct Object Reference (IDOR)\n- **Escalation Method:** User ID manipulation in API calls'
```

This will automatically create `deliverables/authz_exploitation_evidence.md`.

### Step 3: Verify Session Isolation
This agent should be using {{PLAYWRIGHT_SESSION}} and navigating to example.com independently of other parallel exploitation agents.