adspower-browser

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is coherent for AdsPower management, but it can use API-key access to read cookies/credentials and delete or share browser profiles, so it needs user review.

Install only if you trust the external adspower-browser npm package and need agent control of AdsPower. Treat the AdsPower API key, cookies, passwords, proxy credentials, and 2FA keys as sensitive. Require explicit confirmation with exact profile IDs before reading cookies, deleting profiles, wiping cache/history, closing all profiles, sharing profiles, or running page JavaScript.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent with this key can act against the user's AdsPower local API with the authority that key grants.

Why it was flagged

The skill explicitly uses an AdsPower API key for local API control, but the registry metadata declares no primary credential or required environment variables.

Skill content
Pass `--port` / `--api-key` when needed, or set the `ADS_API_KEY` environment variable before running `start`.
Recommendation

Declare and treat the AdsPower API key as sensitive; only provide it when you trust the CLI and intend the requested operation.

What this means

A mistaken or overbroad request could expose web-account sessions or credentials stored in AdsPower profiles.

Why it was flagged

The skill handles account passwords, cookies, and 2FA-style key material, and can retrieve profile cookies, which can function as reusable login sessions. The artifacts do not specify output handling or require confirmation before cookie retrieval.

Skill content
At least one of **username**, **password**, **cookie**, **fakey** (required): Account information. ... **get-profile-cookies** — Query cookies of the specified profile.
Recommendation

Require explicit user approval and exact profile IDs before reading cookies or handling account credentials, and avoid returning or storing cookies unless strictly necessary.

What this means

Profiles could be deleted or shared to another account if the agent interprets a request too broadly or uses the wrong IDs or receiver.

Why it was flagged

The skill documents destructive and transfer operations over AdsPower profiles, including batch sharing, without adding an explicit confirmation, rollback, or narrow-scope requirement.

Skill content
**delete-browser** — Delete the browser(s). ... **share-profile** — Share profiles via account email or phone. Max 200 per request.
Recommendation

Before delete, cache-wipe, close-all, or share operations, require a clear user confirmation that includes the exact profile IDs and destination account.

What this means

The installed CLI will handle AdsPower API access and profile data, so a compromised or unexpected package version would be high impact.

Why it was flagged

The skill depends on a globally installed external npm package whose code is not included in the artifact scan and is not pinned in the instruction.

Skill content
npm install -g adspower-browser
Recommendation

Install only from a trusted npm source, pin or verify the package version, and review the package before providing API keys or profile data.

What this means

Running untrusted JavaScript in a logged-in browser profile could read or change page state and account data.

Why it was flagged

The referenced automation map includes a raw page-script execution capability. This can be legitimate for browser automation, but it is powerful when used inside authenticated AdsPower profiles.

Skill content
`evaluate-script` | Run JavaScript in the page context.
Recommendation

Use script evaluation only with trusted code and explicit user approval, preferably after safer targeted automation commands have been considered.

What this means

The AdsPower runtime may continue running with API access until stopped.

Why it was flagged

The skill can start a local AdsPower runtime and also documents stop/status commands. This is disclosed and purpose-aligned, but users should be aware of the long-running local control surface.

Skill content
ads start -k <KEY>                    # Start the adspower runtime ... ads stop                              # Stop the adspower runtime
Recommendation

Stop the runtime when finished and avoid leaving API-key-enabled headless sessions running unnecessarily.