Install
openclaw skills install silmaril-cdpBrowser automation, DOM inspection, page mutation, wait orchestration, flow execution, and local proxy override work through the Silmaril Chrome DevTools Protocol toolkit. Use when the task requires opening Chrome with CDP, navigating pages, reading DOM or source, extracting structured data, clicking or typing into elements, evaluating JavaScript, waiting for UI state changes, running Silmaril flow JSON files, or managing mitmproxy-backed local overrides.
openclaw skills install silmaril-cdpUse this skill to operate the local Silmaril toolkit from PowerShell.
D:\silmairl cdp\silmaril.cmd in this environment.silmaril.cmd on PATH or in a nearby checkout.& 'D:\silmairl cdp\silmaril.cmd' ....Use this setup on Windows when the toolkit is not already present:
Only clone or copy the toolkit after the user explicitly approves fetching or installing remote code.
Clone or copy the repository:
git clone https://github.com/Malac12/CDP-tools.git "D:\silmairl cdp"
Ensure Chrome, Chromium, or Edge is installed.
The toolkit checks standard Windows install paths and falls back to chrome.exe on PATH.
Run the toolkit from PowerShell:
& 'D:\silmairl cdp\silmaril.cmd' openbrowser --json
& 'D:\silmairl cdp\silmaril.cmd' openUrl 'https://example.com' --json
& 'D:\silmairl cdp\silmaril.cmd' get-text 'body' --json
This is sufficient for the core CDP workflow. No machine-wide PowerShell execution policy change is required because silmaril.cmd invokes PowerShell with ExecutionPolicy Bypass.
openbrowser.openUrl.exists, get-text, query, or get-dom.run for short repeatable flows.--json for almost every command so later steps can parse structured output.get-source when choosing selectors or checking rendered state.data-test, data-testid, semantic IDs, and meaningful attributes.--target-id or --url-match when multiple tabs exist; never use both together.--yes for page actions and mutations such as click, type, set-text, set-html, and eval-js.eval-js, proxy-override, proxy-switch, and openurl-proxy as high-risk commands.--allow-unsafe-js for eval-js, or set SILMARIL_ALLOW_UNSAFE_JS=1 only for a trusted local session.--allow-mitm for proxy commands, or set SILMARIL_ALLOW_MITM=1 only for a trusted local session.--allow-nonlocal-bind.eval-js --file instead of pasting large inline expressions.get-text for a single text value.query for structured multi-row extraction.get-dom to debug selector or markup issues.get-source only when raw response HTML matters more than the rendered DOM.wait-for, wait-for-any, wait-for-gone, wait-until-js, or wait-for-mutation to synchronize.references/command-patterns.md for common command shapes and PowerShell-safe examples.references/flows.md before building or editing a run flow.references/proxy.md when working with openurl-proxy, proxy-override, or proxy-switch.