Alibaba Supplier Outreach
PassAudited by ClawScan on May 1, 2026.
Overview
The skill’s behavior matches its stated purpose, but it uses a logged-in Alibaba browser session to send real supplier messages, so users should supervise it carefully.
Install only if you are comfortable letting the agent operate a logged-in Alibaba session for supplier sourcing. Keep control of approvals, review generated messages carefully, and make sure the LaunchFast and Chrome automation MCP tools are trusted.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent may view or act within the user’s Alibaba account while performing supplier outreach.
The skill depends on an authenticated Alibaba browser session, giving the agent delegated access to a real third-party business account.
Chrome open with Alibaba.com, user must be **logged in**
Use a dedicated Alibaba account if possible, keep the browser visible, and review any account action before allowing it to proceed.
If approved too casually, the agent could send imperfect or unintended business messages to selected suppliers.
The skill automates browser actions to send supplier inquiries, but the visible workflow includes user approval before the send step.
Show the message to the user and ask for approval before sending.
Review the generated message, supplier recipients, quantities, pricing, and timing before approving any send action.
The skill’s safety depends partly on the installed MCP tools that perform supplier research and browser automation.
The instruction-only skill relies on external MCP tools whose implementation is not included in the provided artifact set.
`mcp__launchfast__supplier_research` tool available - Chrome automation tools (`mcp__claude-in-chrome__*`) available
Confirm those MCP tools are installed from trusted sources and have permissions appropriate for Alibaba browsing and supplier research.
