Web Freedom Toolkit

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is designed to bypass website protections and includes powerful browser takeover utilities, so it should be reviewed carefully before use.

Install only if you have a legitimate, authorized need for anti-bot testing or controlled web automation. Use a VM/container, avoid logged-in browser profiles, require explicit approval for each target site, pin dependencies, and do not rely on the package's own audit claims as proof of safety.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could use this to access or scrape websites while bypassing defenses, creating legal, account, or abuse-risk consequences for the user.

Why it was flagged

The skill is not merely a browser automation helper; it explicitly advertises arbitrary-target evasion of anti-bot and WAF protections.

Skill content
Ideal for bypassing Cloudflare and standard WAFs ... Uses `curl_cffi` for kernel-level TLS/JA4 fingerprinting ... python3 scripts/freedom_engine.py "https://target-site.com"
Recommendation

Use only for targets you own or are explicitly authorized to test, require per-target human approval, and do not enable autonomous use for protected third-party sites.

What this means

If run against a browser session or sensitive page, these scripts could manipulate the page or act through the browser's current context.

Why it was flagged

The bundled high-privilege scripts are documented as raw CDP/driver takeover paths capable of executing page JavaScript and bypassing normal library safeguards.

Skill content
Risk: High. Can execute any JavaScript on the current page via `Runtime.evaluate` ... Bypasses standard application-level sandboxing of the scraping library.
Recommendation

Run only in an isolated VM/container with no personal browser profile or logged-in sessions, and avoid using the takeover scripts unless strictly necessary and manually approved.

What this means

Users may over-trust the package's safety claims despite the included anti-bot bypass and browser takeover capabilities.

Why it was flagged

This is a self-contained, unsupported audit/verification claim inside the package, which could encourage unsafe trust in high-risk scripts.

Skill content
**Audit Status**: Verified by SpatialGPT SOTA Engine (2026)
Recommendation

Ignore bundled self-audit claims and rely on independent review, source inspection, and sandboxed testing.

What this means

A local relay could expose browser debugging access to local processes for up to an hour if started.

Why it was flagged

The package can start a local TCP relay for browser debugging traffic; it is bound to localhost and has time limits, but it can still run in the background during a task.

Skill content
IDLE_TIMEOUT = 300 ... MAX_LIFESPAN = 3600 ... server.bind(('127.0.0.1', local_port))
Recommendation

Start the relay only when needed, confirm it terminates afterward, and run it inside an isolated environment.

What this means

Future dependency versions could change behavior or introduce vulnerabilities.

Why it was flagged

The skill depends on external Python packages with lower-bound-only version ranges; these dependencies are purpose-aligned but not pinned.

Skill content
curl_cffi>=0.14.0 ... DrissionPage>=4.1.1.2 ... requests>=2.31.0
Recommendation

Pin and review dependency versions before installing, preferably in a disposable virtual environment or container.