Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Bb Browser Openclaw

v1.0.0

Turn any website into a CLI command. 36 platforms, 103 commands — Twitter, Reddit, GitHub, YouTube, Zhihu, Bilibili, Weibo, and more. Uses OpenClaw's browser...

0· 268·2 current·3 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name/description align with the declared requirement for the bb-browser binary and the SKILL.md commands (bb-browser site ... --openclaw). However the instructions also reference the 'openclaw' CLI (openclaw browser open ...) and promise to 'write the adapter, test it, and submit a PR'—those capabilities would normally require additional tooling/credentials (openclaw binary, git/GitHub token) that are not declared.
!
Instruction Scope
SKILL.md instructs the agent to run bb-browser commands that use the user's browser login state (expected for this use). But it also instructs the agent to open OpenClaw's browser via 'openclaw browser open' (openclaw is not declared as a required binary or allowed tool) and to 'reverse-engineer the API, write the adapter, test it, and submit a PR'—actions that imply code generation, Git operations, and remote writes. Those write/submit steps are not scoped, authorized, or supported by declared requirements and could prompt the agent to access network resources or request credentials unexpectedly.
Install Mechanism
This is an instruction-only skill with no install spec, so nothing will be written to disk by an installer. That minimizes install-time risk.
Credentials
The skill declares no environment variables or credentials, which is coherent for a read-only browsing/data-extraction skill. However it explicitly relies on the user's OpenClaw browser login state (session cookies) to access sites that require login. Additionally, SKILL.md's mention of submitting PRs suggests the need for GitHub credentials or similar, but no such credentials are requested or documented—this is an unaddressed gap.
Persistence & Privilege
always is false and the skill does not request persistent privileges. It does not attempt to modify other skills or system settings.
What to consider before installing
This skill appears to be what it says: a front-end for the bb-browser CLI that runs through OpenClaw's browser. Before installing, check the following: 1) Ensure you have the bb-browser binary on your system (the skill requires it). 2) Expect the skill to depend on your OpenClaw browser session (it uses cookies/login state); do not use it with accounts you wouldn't want accessed by CLI-driven browsing. 3) Be aware of two incoherences in the SKILL.md: it calls 'openclaw browser open' (but openclaw is not declared as a required binary/allowed tool) and it promises to 'write the adapter, test it, and submit a PR' (which typically requires git/GitHub credentials). Ask the author how adapter creation and PR submission are authenticated and whether the agent will perform pushes or require tokens. 4) If you plan to use adapter-creation features, test in a sandboxed account and confirm which tools (openclaw, git) the agent will actually invoke and whether it will prompt for credentials. If you do not want the agent to perform code commits or network writes, avoid using the adapter-creation flow or explicitly deny authorization for git/GitHub tokens.

Like a lobster shell, security has layers — review code before you run it.

latestvk978t480dnzpstp3nkchjn559x83szeq

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Runtime requirements

Binsbb-browser

Comments