Agent Browser

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked on a real account, the agent could submit forms, click buttons, upload or download files, or otherwise change website state beyond what the user intended.

Why it was flagged

The skill gives the agent broad, mutation-capable browser authority across arbitrary websites; the artifacts present safety controls such as allowlists as optional rather than required.

Skill content
Use when interacting with websites — navigating pages, filling forms, clicking buttons... downloading files, or automating any browser task. Triggers on... 'login to a site'...
Recommendation

Use a domain allowlist and action policy, require explicit confirmation before login, submissions, purchases, posting, uploads, or account changes, and prefer a disposable browser profile.

What this means

Saved passwords, cookies, or an existing browser profile could let the agent continue acting as the user on websites after the initial login.

Why it was flagged

The documented commands can store passwords, save and reload session cookies/localStorage, and attach to an existing Chrome profile; the artifacts do not define credential scope, storage protections, or retention.

Skill content
agent-browser auth save github --url https://github.com/login --username user --password-stdin ... agent-browser state save auth.json # Save cookies/localStorage ... agent-browser --auto-connect open <url>  # Auto-discover Chrome
Recommendation

Avoid saving credentials unless necessary, use a separate low-privilege browser profile, delete saved state promptly, and verify where and how the auth vault stores secrets before use.

What this means

Installing the skill can execute external package code with the user's local privileges, so a compromised or different npm package version could affect the machine.

Why it was flagged

The setup script globally installs whatever npm package version resolves at run time and then runs its browser installer, without a pinned version, hash, lockfile, or reviewed package source in the supplied artifacts.

Skill content
npm install -g agent-browser ... agent-browser install --with-deps 2>/dev/null || agent-browser install
Recommendation

Pin the package version, provide a trusted source/homepage and lockfile or checksum, and install in a sandbox or disposable environment until the package provenance is verified.

What this means

A malicious webpage could include text that attempts to steer the agent away from the user's real instructions.

Why it was flagged

The skill reads arbitrary webpage content into the agent context, and its AI-safety content-boundary control is documented as optional.

Skill content
agent-browser snapshot -i ... agent-browser get text body > page.txt ... export AGENT_BROWSER_CONTENT_BOUNDARIES=1          # Wrap output for AI safety
Recommendation

Enable content boundaries, treat webpage text as untrusted, and do not let page-provided instructions override the user's instructions without confirmation.