Back to skill
v1.0.0

Camoufox Tools

ReviewClawScan verdict for this skill. Analyzed May 1, 2026, 6:15 AM.

Analysis

This skill is review-worthy because it enables anti-detection browser automation with arbitrary page JavaScript, while the advertised command implementations are missing and the installer persistently changes the shell PATH.

GuidanceBefore installing, confirm you genuinely need anti-detection scraping, verify that the missing fox-* command files come from a trusted source, and understand that install.sh will persistently edit your shell PATH. Avoid using fox-eval or scraping commands on sensitive logged-in pages unless you explicitly intend that access.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

Abnormal behavior control

Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.

Tool Misuse and Exploitation
SeverityMediumConfidenceHighStatusConcern
SKILL.md
camoufox 是基于 Firefox 的防指纹浏览器,能绕过 Bilibili 等网站的风控 ... fox-eval - 执行 JavaScript

The skill explicitly advertises anti-detection browsing to bypass site risk controls and exposes a general JavaScript execution command in the current page, which is a broad browser-automation capability rather than a narrowly scoped scraper.

User impactThe agent could automate websites in ways that bypass anti-bot controls, and arbitrary page JavaScript could inspect or alter page state if used on sensitive or logged-in pages.
RecommendationUse only on sites and accounts you are permitted to automate, avoid logged-in sessions unless necessary, and require explicit review before running fox-eval or other browser actions.
Agentic Supply Chain Vulnerabilities
SeverityMediumConfidenceHighStatusConcern
install.sh
BIN_DIR="$SCRIPT_DIR/bin" ... for tool in "$BIN_DIR"/fox-* ... export_line="export PATH=\"$BIN_DIR:\$PATH\""

The installer trusts and prepends a bin directory for fox-* tools, but the provided manifest lists only SKILL.md and install.sh, so the actual command implementations advertised by the skill are not present in the artifacts.

User impactUsers cannot review the real behavior of fox-open, fox-scrape, fox-eval, fox-close, or fox-bilibili-stats from this package, yet installation prepares the shell to run commands from that directory.
RecommendationVerify the actual bin/fox-* files and their source before installing or adding the directory to PATH.
Rogue Agents
SeverityLowConfidenceHighStatusNote
install.sh
echo "# camoufox-tools" >> "$shell_rc"
echo "$export_line" >> "$shell_rc"

The installer persistently modifies the user's shell startup file so future shells include the skill's bin directory in PATH.

User impactFuture terminal sessions will prefer commands in the skill's bin directory until the PATH entry is removed.
RecommendationReview the shell startup file after installation and remove the camoufox-tools PATH entry if you no longer want the skill active.