HARPA AI

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill is a coherent HARPA integration, but it gives the agent powerful access to logged-in browser sessions, page contents, webhooks, and long-running browser automation jobs.

Use this skill only if you are comfortable letting an agent control HARPA-connected browser sessions. Prefer a dedicated browser profile, a limited HARPA API key, specific node IDs, and trusted webhook destinations. Do not use it on banking, admin, healthcare, private inboxes, or other sensitive logged-in sites unless you explicitly intend to share that page context with HARPA and any selected AI connection.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill may be able to read data from websites where the HARPA browser is already logged in.

Why it was flagged

The skill can act through a logged-in browser session and use the user's cookies to access authenticated pages, which is powerful account/session authority.

Skill content
Scraping behind-login pages works because HARPA runs inside a real browser session with the user's cookies
Recommendation

Use a dedicated browser profile or low-privilege account for HARPA nodes, avoid sensitive sites, and require explicit user approval before scraping or prompting against logged-in pages.

What this means

A mistaken or over-broad agent request could run automation on a live website using the user's browser context.

Why it was flagged

The skill exposes broad browser automation through built-in and custom commands, but the artifact does not define limits on what those commands may do on live websites.

Skill content
Execute one of 100+ built-in HARPA commands or a custom automation on a target page
Recommendation

Confirm the target site, command name, and intended effect before running custom HARPA commands, especially on authenticated or business-critical websites.

ConcernHigh Confidence
ASI08: Cascading Failures
What this means

A single poorly scoped action could run across all connected HARPA browser nodes instead of only one intended browser.

Why it was flagged

The API can broadcast an action to every available HARPA browser node, which can multiply the impact of a bad scrape, prompt, or automation request across multiple browser sessions.

Skill content
`"node": "*"` — broadcast to all nodes
Recommendation

Avoid all-node targeting unless it is truly needed; prefer a specific node ID and ask for confirmation before multi-node or broadcast actions.

What this means

Private page contents or account data could be sent to an external webhook if the agent or user chooses an unsafe destination.

Why it was flagged

Scraped page contents or AI outputs can be sent asynchronously to a webhook URL and retained, but the artifact does not restrict the destination or warn against sensitive authenticated data.

Skill content
`resultsWebhook` ... URL to POST results to asynchronously (retained 30 days)
Recommendation

Only use webhooks you control and trust, avoid webhooks for sensitive pages, and verify HARPA's retention and deletion controls before sending private data.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

An automation request might complete later than expected, after a browser node reconnects.

Why it was flagged

The asynchronous workflow is disclosed and bounded by time, but it can continue after the initial request and wait for browser nodes to come online.

Skill content
The action stays alive for up to 30 days, useful when target nodes are temporarily offline.
Recommendation

Use asynchronous actions only when needed, track outstanding jobs, and avoid long-lived tasks involving sensitive logged-in websites.