LinkedIn Bulk Connect

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill clearly automates bulk LinkedIn connection requests from a logged-in account and includes anti-detection guidance, so it should be reviewed carefully before use.

Install only if you are comfortable letting an agent operate your logged-in LinkedIn account and send connection requests from a reviewed list. Avoid using it for large batches or anti-detection behavior, and prefer a dry run, explicit confirmations, and a dedicated browser profile.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could send many LinkedIn requests automatically, including to wrong or unintended people if matching fails, which may affect the user's reputation or account status.

Why it was flagged

The instructions tell the agent to use browser automation to send connection requests from the user's LinkedIn account, which is a high-impact account mutation and does not require per-recipient approval at the confirm dialog.

Skill content
Buttons: `Dismiss` | `Add a note` | `Send without a note`

```
browser action=act request={"kind":"click","ref":"<send-without-note-ref>"}
```
Recommendation

Require an explicit dry run, a reviewed recipient list, a small batch limit, and user confirmation before sending each request or each batch.

What this means

Using the skill may violate LinkedIn's automation rules or trigger account restrictions, especially because it is designed for bulk connection activity.

Why it was flagged

The workflow explicitly includes anti-detection instructions for browser automation on LinkedIn, indicating an attempt to avoid platform automation controls rather than simply helping with a normal user-directed task.

Skill content
Always navigate to the feed before loading a new profile. **Never skip this step.** Jumping directly between profile URLs is the primary trigger for LinkedIn's automation detection.
Recommendation

Avoid anti-detection automation. If used at all, keep actions manual or very small-scale, and make the user aware of account and platform-policy risks before proceeding.

What this means

The agent can perform LinkedIn actions as the user, including sending requests, using the user's live browser session and account identity.

Why it was flagged

The skill operates through the user's already-authenticated LinkedIn browser session, giving the agent delegated authority to act as the user on that account.

Skill content
User opens LinkedIn in their regular Chrome browser and clicks the OpenClaw Relay toolbar icon on that tab
Recommendation

Declare the LinkedIn session requirement clearly, use a dedicated browser/profile where possible, and require explicit user approval before any account-changing action.

What this means

The skill may continue to be able to use the logged-in LinkedIn session in later sessions unless the user logs out or clears the profile.

Why it was flagged

Persistent cookies are normal for a browser-based LinkedIn workflow, but they mean future runs may continue to have access to the authenticated account.

Skill content
On first use, navigate to `https://www.linkedin.com` and let the user log in; cookies persist across sessions
Recommendation

Use a dedicated browser profile, log out when finished, and clear cookies if the user does not want future access to persist.