Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Persistent Browser Scraper

v1.0.0

用 Playwright 持久化上下文(main-identity)抓取需要登录态的网站(YouTube、GitHub、HuggingFace、Reddit、Kaggle、X/Twitter)。当用户要求外网搜索或指定这些网站时自动触发。

0· 154·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
high confidence
!
Purpose & Capability
The described purpose (scraping sites that require login via a persistent Playwright context) is coherent with using launch_persistent_context. However, the SKILL.md hardcodes a specific user_data_dir (/home/kncao/.openclaw/browser-profiles/main-identity) and instructs manipulating its files. The skill metadata declares no required config paths or credentials, so the instructions demand access beyond what was declared and beyond a typical scraper's minimal needs.
!
Instruction Scope
The runtime instructions explicitly tell the agent to read/write a local browser profile and to rm -f the SingletonLock before each run. That is file-system access and modification of another profile on disk (potentially containing cookies, sessions, credentials). The instructions also require running Playwright headful with args (including --no-sandbox and anti-detection flags), which expands runtime privileges and evasion tactics. These actions go beyond simple page fetching and implicate sensitive local data and destructive operations.
Install Mechanism
This is instruction-only (no install spec), which limits installation-time risk. However, the SKILL.md assumes Playwright (and a browser) are available but does not declare required binaries or packages. The missing dependency declarations are an incoherence: the skill will fail or behave unpredictably unless Playwright and appropriate browsers are present.
!
Credentials
No environment variables or credentials are requested, yet the skill asks to use a persistent browser profile that likely contains cookies, tokens, and session state. Access to that profile is disproportionate and privacy-sensitive. The skill gives no guidance for using a dedicated/sandboxed profile or requesting explicit user consent for accessing such data.
!
Persistence & Privilege
The skill is not marked always:true, but disable-model-invocation is false (normal), meaning the agent could autonomously invoke this skill when triggered by web-search intents. Autonomous invocation combined with the ability to read/modify a local logged-in browser profile increases the blast radius and privacy risk if invoked without explicit user confirmation.
What to consider before installing
This skill instructs the agent to open and modify a hard-coded local browser profile (including deleting a lock file) to scrape logged-in content. That profile can contain cookies, sessions, and other sensitive data. Before installing: (1) do not install unless you fully trust the skill author and understand why it needs your browser profile; (2) prefer a design that uses explicit API tokens or a dedicated, sandboxed browser profile rather than your main identity; (3) require the skill to declare dependencies (Playwright, browser) and the config path it will use, and change the path to a profile you control; (4) avoid running with --no-sandbox and headful flags on untrusted code; (5) if you test it, run inside an isolated VM/container with a throwaway profile and monitor file access; (6) consider disabling autonomous invocation so the skill runs only with explicit user approval.

Like a lobster shell, security has layers — review code before you run it.

latestvk97bfkve77465p65jdf956na6h83aq10

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments