Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Web Access.Bak

v1.0.0

所有联网操作必须通过此 skill 处理,包括:搜索、网页抓取、登录后操作、网络交互等。 触发场景:用户要求搜索信息、查看网页内容、访问需要登录的网站、操作网页界面、抓取社交媒体内容(小红书、微博、推特等)、读取动态渲染页面、以及任何需要真实浏览器环境的网络任务。

0· 154·1 current·2 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
Purpose & Capability
Skill 声称提供基于 Chrome CDP 的浏览器访问与爬取能力,包含的脚本(cdp-proxy.mjs、check-deps.sh、match-site.sh)与 SKILL.md 中的 CDP Proxy HTTP API、/eval、/click、/setFiles 等端点一致,所需资源(本地 Chrome + Node)与目标功能相符.
!
Instruction Scope
运行时指令允许执行任意 JS(/eval)、截屏、读取 DOM、并可通过 /setFiles 将本地文件路径注入到浏览器的 file input(绕过文件对话框)。这些行为超出普通“抓取”范围:它们能读取登录会话内的私人信息、采集敏感页面、并把本地文件提交到远端站点。SKILL.md 也鼓励创建后台 tab 并长期运行 Proxy,子 Agent 自动加载并并行操作,扩大了可执行面。
Install Mechanism
没有远程下载或不明来源的二进制;脚本为本地 Node.js 脚本和 shell 脚本。没有 extract/download-from-URL 风险。风险来自于启动并长期运行本地代理进程(node cdp-proxy.mjs)。
Credentials
不要求任何环境变量或外部凭据(符合其用途)。但 SKILL.md 建议可选地调用第三方服务 Jina (r.jina.ai),该步骤会把网页内容/URL 发到外部服务,可能导致敏感数据泄露。skill 本身可以利用用户已有的 Chrome 登录态(自然且必要),但这也是主要隐私风险来源。
!
Persistence & Privilege
虽然 always:false, 但是代理设计为持续运行(建议不主动停止),并监听本地 HTTP(默认 127.0.0.1:3456)。长期驻留的本地代理 + 能访问 Chrome 会话意味着长期的高权限访问面。并行子 Agent 自动加载机制进一步扩大了可被自动触发的行为集合。
What to consider before installing
This skill legitimately implements a local CDP proxy to drive your Chrome, which inherently gives it access to everything your browser session can see and do. Before installing or running it: - Only use if you fully trust the source; the repository is unknown and the homepage is missing. Review the full scripts yourself (especially cdp-proxy.mjs) or ask a trusted reviewer. - Understand the risks: the proxy can read pages where you're logged in, capture screenshots (including video frames), execute arbitrary JS in pages, and cause the browser to upload local files (setFiles). Any of these can leak credentials, private messages, or local files. - Avoid running against your primary browser profile. Prefer an isolated Chrome profile or a dedicated browser instance launched solely for this skill (or run inside a sandbox/VM). - If you must use it, do NOT enable the optional Jina usage for sensitive pages — it sends data to a third-party service. - The proxy listens on localhost:3456 by default; ensure only trusted local processes/users have access, and monitor /tmp/cdp-proxy.log for unexpected activity. - If you cannot audit the code, do not grant it persistent use; prefer one-off manual actions under supervision. Summary action: only proceed if you trust the author and can run the proxy in an isolated environment (separate Chrome profile or VM); otherwise treat this skill as high-risk for data-exfiltration.

Like a lobster shell, security has layers — review code before you run it.

latestvk971qhyg97j72kxvtkk2dsh94n83qrey

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments