LinkedIn Scraper

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill uses your logged-in Chrome/LinkedIn session to bulk scrape profiles with stealth-style avoid-detection guidance, which can put your account and collected personal data at risk.

Install only if you understand and accept the account, privacy, and policy risks of automated LinkedIn scraping. Prefer official APIs or permitted exports, use a dedicated browser profile, require explicit approval for each scrape, avoid stealth/anti-detection behavior, and manage or delete any saved lead data responsibly.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your LinkedIn account could be rate-limited, challenged, restricted, or associated with automated scraping of other people's profile data.

Why it was flagged

The skill directs browser automation to scrape LinkedIn profiles in bulk and includes explicit anti-detection behavior, which is materially risky even though it also says to stop on CAPTCHA.

Skill content
Search + Bulk Scrape ... For each profile URL: open → snapshot → parse full profile ... Maximum 80 profiles per session ... Randomize delays between 3-8 seconds (avoid detection) ... Stealth Patterns
Recommendation

Do not use stealth/avoid-detection scraping workflows. Require explicit per-run approval, strict limits, and prefer official, terms-compliant APIs or exports.

What this means

Actions and access may be attributed to your LinkedIn account, and your logged-in browser session is used for bulk data collection.

Why it was flagged

The skill relies on the user's authenticated browser session rather than a scoped API credential, so automation runs with the user's LinkedIn account access.

Skill content
Scrape LinkedIn profiles and search results using the user's authenticated Chrome browser session. No API keys needed — uses the browser tool with the Chrome profile relay.
Recommendation

Use a dedicated/sandboxed browser profile if used at all, declare this session dependency clearly, and require user confirmation before any authenticated browsing or scraping.

What this means

Scraped names, jobs, education, locations, and profile URLs may remain in your local workspace and be reused in later workflows.

Why it was flagged

The skill can persist scraped LinkedIn profile and lead data in a local workspace database, which is purpose-aligned but creates retained personal-data records.

Skill content
Return structured JSON or insert into DuckDB ... Batch insert into DuckDB ... INSERT INTO v_leads
Recommendation

Set clear retention, deletion, and access rules for any saved lead data, and avoid storing information you are not allowed to collect or keep.

What this means

You have limited external provenance information to judge who authored the scraping instructions or whether they align with your policies.

Why it was flagged

There is no executable package to inspect, which limits install-time risk, but provenance is unclear for a skill that requests sensitive browser-session automation.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.
Recommendation

Review the skill text carefully before use and prefer skills from known sources for workflows involving authenticated accounts.