LinkedIn Bulk Connect
WarnAudited by ClawScan on May 10, 2026.
Overview
This skill clearly automates bulk LinkedIn connection requests from a logged-in account and includes anti-detection guidance, so it should be reviewed carefully before use.
Install only if you are comfortable letting an agent operate your logged-in LinkedIn account and send connection requests from a reviewed list. Avoid using it for large batches or anti-detection behavior, and prefer a dry run, explicit confirmations, and a dedicated browser profile.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent could send many LinkedIn requests automatically, including to wrong or unintended people if matching fails, which may affect the user's reputation or account status.
The instructions tell the agent to use browser automation to send connection requests from the user's LinkedIn account, which is a high-impact account mutation and does not require per-recipient approval at the confirm dialog.
Buttons: `Dismiss` | `Add a note` | `Send without a note`
```
browser action=act request={"kind":"click","ref":"<send-without-note-ref>"}
```Require an explicit dry run, a reviewed recipient list, a small batch limit, and user confirmation before sending each request or each batch.
Using the skill may violate LinkedIn's automation rules or trigger account restrictions, especially because it is designed for bulk connection activity.
The workflow explicitly includes anti-detection instructions for browser automation on LinkedIn, indicating an attempt to avoid platform automation controls rather than simply helping with a normal user-directed task.
Always navigate to the feed before loading a new profile. **Never skip this step.** Jumping directly between profile URLs is the primary trigger for LinkedIn's automation detection.
Avoid anti-detection automation. If used at all, keep actions manual or very small-scale, and make the user aware of account and platform-policy risks before proceeding.
The agent can perform LinkedIn actions as the user, including sending requests, using the user's live browser session and account identity.
The skill operates through the user's already-authenticated LinkedIn browser session, giving the agent delegated authority to act as the user on that account.
User opens LinkedIn in their regular Chrome browser and clicks the OpenClaw Relay toolbar icon on that tab
Declare the LinkedIn session requirement clearly, use a dedicated browser/profile where possible, and require explicit user approval before any account-changing action.
The skill may continue to be able to use the logged-in LinkedIn session in later sessions unless the user logs out or clears the profile.
Persistent cookies are normal for a browser-based LinkedIn workflow, but they mean future runs may continue to have access to the authenticated account.
On first use, navigate to `https://www.linkedin.com` and let the user log in; cookies persist across sessions
Use a dedicated browser profile, log out when finished, and clear cookies if the user does not want future access to persist.
