Camoufox Tools
Analysis
This skill is review-worthy because it enables anti-detection browser automation with arbitrary page JavaScript, while the advertised command implementations are missing and the installer persistently changes the shell PATH.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
camoufox 是基于 Firefox 的防指纹浏览器,能绕过 Bilibili 等网站的风控 ... fox-eval - 执行 JavaScript
The skill explicitly advertises anti-detection browsing to bypass site risk controls and exposes a general JavaScript execution command in the current page, which is a broad browser-automation capability rather than a narrowly scoped scraper.
BIN_DIR="$SCRIPT_DIR/bin" ... for tool in "$BIN_DIR"/fox-* ... export_line="export PATH=\"$BIN_DIR:\$PATH\""
The installer trusts and prepends a bin directory for fox-* tools, but the provided manifest lists only SKILL.md and install.sh, so the actual command implementations advertised by the skill are not present in the artifacts.
echo "# camoufox-tools" >> "$shell_rc" echo "$export_line" >> "$shell_rc"
The installer persistently modifies the user's shell startup file so future shells include the skill's bin directory in PATH.
