broswer use skill
Analysis
This skill is not clearly malicious, but it gives an agent broad control over your Chrome browser and related tools, including form actions, file uploads, screenshots sent to an LLM, and script execution.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
browser-cli interact click btn-42 --tab 123 ... browser-cli interact fill input-5 "hello world" ... browser-cli interact upload --tab 123 --file-path /path/to/file ... browser-cli interact computer --action left_click
The skill exposes direct browser interaction, form filling, file upload, and pixel-level clicking through shell commands, with no documented confirmation or scoping requirements.
browser-cli skill run my-skill scripts/init.js # Execute skill script
The documented CLI can execute scripts from AIPex skills, which goes beyond page interaction and gives the agent a path to run local skill code.
browser-cli installed globally: npm install -g browser-cli
The skill is instruction-only and requires installing an external global npm package; this is expected for a CLI skill, but the package code is not present in the provided artifacts.
The daemon auto-spawns on first use and self-terminates when idle.
The background daemon behavior is disclosed and tied to the browser-control purpose, but users should notice that the tool starts a local service automatically.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
browser-cli ──WebSocket──▶ aipex-daemon ──WebSocket──▶ AIPex Chrome Extension ──▶ Browser APIs
The CLI acts through a connected Chrome extension and Browser APIs, but the artifact does not bound which browser profiles, sites, tabs, or signed-in web sessions the agent may control.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
browser-cli page screenshot-tab 123 --send-to-llm true # Screenshot with LLM analysis
The skill documents sending a browser screenshot to an LLM, but the artifact does not define destination, redaction, retention, or approval boundaries for potentially sensitive page content.
