Drission Sota Toolkit

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a high-risk browser automation toolkit that can control local Chrome/CDP sessions and bypass bot protections, while its metadata and safety controls are inconsistent.

Do not install this as a general-purpose scraper. Only consider it if you intentionally need advanced CDP/browser automation, can inspect the code, and will run it in an isolated VM or container with a disposable browser profile. Avoid logged-in sessions, disable autonomous invocation for high-risk scripts, and require the publisher to fix the misleading metadata and gating issues first.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user or agent could approve the skill believing it is a minimal scraper while receiving a package with much broader browser-control capabilities.

Why it was flagged

The shipped package includes high-risk files such as CDP takeover, driver injection, and relay scripts, while this manifest claims no high-risk capabilities and uses a different version from the registry/SKILL text.

Skill content
"description": "Minimal Web Scraper (Lab v7.0). Only basic search and aggregation scripts. No high-risk capabilities included."
Recommendation

Require the publisher to align metadata with the actual shipped files, declare all high-risk capabilities, and remove stale or misleading manifest entries before installation.

What this means

If used with a real browser profile, the skill could manipulate pages or accounts the user is logged into.

Why it was flagged

Raw CDP control over the current page can operate inside an active browser session, including pages where the user may already be authenticated.

Skill content
*   **Risk**: High. Can execute any JavaScript on the current page via `Runtime.evaluate`.
Recommendation

Use only a dedicated, non-logged-in browser profile in an isolated environment, and require explicit per-action approval for any CDP or JavaScript execution.

What this means

An autonomous agent or script that can set environment variables could enable a powerful browser-control path without the user meaning to authorize that specific action.

Why it was flagged

A high-impact direct browser-driver injection path is gated by an environment variable rather than a robust human approval flow, despite the skill documentation emphasizing physical gating.

Skill content
SAFETY: Requires environment variable SOTA_NUCLEAR_CONFIRMED=true ... driver = BrowserDriver(_id='sota_hardened_probe', address=ws_url, owner=None)
Recommendation

Replace environment-variable approval with an explicit interactive confirmation and whitelist exactly which high-risk scripts may run.

What this means

The skill could be used for web activity that violates site rules or creates account/network risk for the user.

Why it was flagged

The code explicitly uses browser/TLS impersonation for no-CAPTCHA access, which is a bot-protection bypass capability not tightly scoped to approved targets.

Skill content
# Using SOTA impersonate to ensure high-speed, no-captcha access ... requests.get(url, impersonate="chrome124", timeout=15)
Recommendation

Limit automation to sites where the user has permission, remove bypass-oriented defaults, and document ethical/legal boundaries clearly.

What this means

A mistaken or manipulated invocation could run unintended local Python code under the user's account.

Why it was flagged

The wrapper builds a subprocess path from a caller-supplied script name without a visible whitelist or path-containment check.

Skill content
def run_protected_script(script_name): ... script_path = os.path.join(base_dir, script_name) ... subprocess.run([sys.executable, script_path], env=clean_env, check=True)
Recommendation

Whitelist allowed bundled scripts, normalize and validate paths, and reject absolute paths or traversal components before launching subprocesses.

What this means

The skill can temporarily keep a local relay process running during a task, which may expose local browser-debugging traffic to same-host processes.

Why it was flagged

The relay creates a local listener, but it is bound to loopback and includes idle and maximum-lifespan shutdown logic.

Skill content
IDLE_TIMEOUT = 300 ... MAX_LIFESPAN = 3600 ... server.bind(('127.0.0.1', local_port))
Recommendation

Run the relay only when needed, verify it exits after use, and avoid using it on shared or untrusted machines.

What this means

Users may over-trust the skill's safety posture based on an unsupported audit/verification statement.

Why it was flagged

The package makes an external-sounding verification claim without supporting provenance in the supplied artifacts, alongside high-risk browser-control code.

Skill content
**Audit Status**: Verified by SpatialGPT SOTA Engine (2026)
Recommendation

Treat the claim as unverified unless the publisher provides independent audit evidence, and base installation decisions on the actual source behavior.