sjht-web-screenshot

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a straightforward Puppeteer screenshot tool, but it can use web-app credentials, run Chromium with sandboxing disabled, and save authenticated page screenshots locally.

Install only if you need automated web screenshots. Use trusted, pinned browser dependencies where possible; run against trusted sites or inside a container; provide least-privileged credentials; avoid storeLogin unless necessary; and save/review screenshots in a safe local folder before sharing.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If you provide real credentials, the skill can view and capture pages available to that account.

Why it was flagged

The skill explicitly supports receiving web-app credentials so it can log in before taking screenshots. This is purpose-aligned for authenticated pages, but it grants access to protected account content.

Skill content
"login.credentials" | ✅* | `{ username, password }`
Recommendation

Use least-privileged or test accounts when possible, keep config files private, and review screenshots before sharing them.

What this means

A careless or untrusted config could make the browser invoke application actions beyond simply navigating and taking screenshots.

Why it was flagged

The advanced login path can invoke a configured Pinia store method in the target page. This is documented as a login fallback, but it is a broad in-page automation escape hatch if configured for methods other than login.

Skill content
This directly calls `pinia._s.get(storeName).method(...args)` via CDP.
Recommendation

Prefer normal form login; only use storeLogin with trusted configs and a clearly understood login-only store method.

What this means

A malicious or compromised website would have less browser sandbox protection than usual.

Why it was flagged

The script launches Chromium with sandbox protections disabled. This is common in some headless/container setups, but it reduces isolation when visiting untrusted sites.

Skill content
'--no-sandbox',
'--disable-setuid-sandbox'
Recommendation

Use this against trusted targets, or run it in a disposable/containerized environment; remove no-sandbox flags if your Chromium setup supports it.

What this means

Different or compromised local installations of Puppeteer/Chromium could affect behavior.

Why it was flagged

The skill relies on globally installed runtime components without pinned versions in the provided artifacts, so the actual code executed depends on the local environment.

Skill content
- `puppeteer-core` (npm global)
- `chromium-browser` (`/usr/bin/chromium-browser`)
Recommendation

Install Puppeteer and Chromium from trusted sources, keep them updated, and consider pinning versions in a controlled environment.