Agent Browser

WarnAudited by ClawScan on May 10, 2026.

Overview

Agent Browser has a legitimate browser-automation purpose, but it can reuse logged-in browser sessions and relies on an external browser-control CLI that needs careful review before use.

Install only if you are comfortable giving an external CLI broad browser-control authority. Use an isolated Chrome profile or test account, avoid importing your primary browser session, verify/pin the CLI package, require confirmation before submitting forms or acting on logged-in sites, and clean up saved session files after use.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent, the external CLI, or any process with access to the saved state or debugging port could act as the user on logged-in websites.

Why it was flagged

The skill documents importing an already logged-in Chrome session and saving cookies/localStorage/session tokens; the documented flow is high-impact and is not clearly limited to one site or one token.

Skill content
agent-browser --auto-connect state save ./my-auth.json ... save its cookies + localStorage ... `--remote-debugging-port` exposes full browser control on localhost. Any local process can connect and read cookies, execute JS, etc. ... State files contain session tokens in plaintext.
Recommendation

Use a dedicated browser profile or test account, avoid auto-connecting to your primary browser, close remote-debugging Chrome when done, encrypt/delete state files, and require explicit approval before authenticated actions.

What this means

A changed or untrusted external package could receive powerful browser-control and session-access authority.

Why it was flagged

The skill allows running or installing an external CLI without a pinned version in the artifact, and the reviewed files contain documentation/templates rather than the CLI implementation that will control the browser.

Skill content
allowed-tools: Bash(npx agent-browser:*), Bash(agent-browser:*) ... Install via `npm i -g agent-browser`, `brew install agent-browser`, or `cargo install agent-browser`. Run `agent-browser install` to download Chrome.
Recommendation

Verify the package source and maintainer, pin a reviewed version where possible, install it manually in an isolated environment, and avoid using it with important accounts until provenance is clear.

What this means

Using these workflows against third-party sites could violate site rules, trigger account/IP blocks, or create legal and operational risk.

Why it was flagged

The proxy guidance explicitly includes rate-limit and ban avoidance for scraping, which can enable misuse beyond ordinary testing or corporate proxy configuration.

Skill content
Proxy configuration for geo-testing, rate limiting avoidance ... ### Rotating Proxies for Scraping ... Rotate through proxy list to avoid rate limiting ... Distribute load and avoid bans
Recommendation

Use proxy features only for authorized testing, respect site terms and rate limits, and avoid automating scraping that bypasses access controls or abuse protections.

What this means

Saved state files may let future runs access accounts without another login, and anyone who obtains those files may be able to reuse the session.

Why it was flagged

The skill creates durable browser state that can be reused across tasks; this is purpose-aligned but can retain sensitive authentication material unless encrypted and cleaned up.

Skill content
Use `--session-name` to auto-save and restore cookies + localStorage by name ... state saved to ~/.agent-browser/sessions/ ... State files contain session tokens in plaintext.
Recommendation

Set an encryption key for saved state, store state files outside shared repositories, add them to .gitignore, and delete them when the automation is finished.

What this means

JavaScript run in a page can read or change page state, cookies/localStorage accessible to the page, and form contents.

Why it was flagged

Arbitrary JavaScript execution is documented and can be useful for browser automation, but it is a powerful page-context execution capability.

Skill content
agent-browser eval -b "<base64>"             # Any JavaScript (base64 encoded)
agent-browser eval --stdin                   # Read script from stdin
Recommendation

Prefer normal click/fill/get commands, and only run JavaScript that the user requested or reviewed.

What this means

A browser session may remain active or authenticated longer than the user expects.

Why it was flagged

The background daemon is disclosed and purpose-aligned, but it means browser state can live beyond a single command.

Skill content
The browser persists between commands via a background daemon, so chaining is safe and more efficient than separate calls.
Recommendation

Close sessions when finished and avoid leaving authenticated automation sessions running unattended.