Agent Browser - 浏览器自动化

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This looks like a legitimate browser-automation skill, but it gives the agent broad website-control powers and depends on unreviewed external software with unclear provenance.

Before installing, verify the official agent-browser package/repository and pin a trusted version. Use a separate browser profile or test account where possible, avoid sensitive sites unless necessary, and require manual approval before uploads, submissions, purchases, account changes, or any irreversible web action.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on a logged-in or sensitive site, the agent could click buttons, submit forms, change account data, or upload files if it misunderstands a task or follows malicious page content.

Why it was flagged

The allowed tool pattern exposes every agent-browser command, and the documented commands include website mutations and file upload. The artifacts do not describe confirmation, site scoping, or action limits for sensitive operations.

Skill content
allowed-tools: Bash(agent-browser:*) ... agent-browser click @e1 ... agent-browser fill @e2 "text" ... agent-browser upload @e1 file.pdf
Recommendation

Use this only on intended sites, prefer test accounts or an isolated browser profile, and require explicit user confirmation before submissions, uploads, purchases, account changes, or other irreversible actions.

What this means

A user may install and run a different or unexpected version of the browser automation tool, including code outside the reviewed skill artifacts.

Why it was flagged

The reviewed skill contains no runnable CLI code and instructs users to install an unpinned global external package/source. The registry lists source/homepage as unknown, and README.md separately references a different repository, creating provenance ambiguity.

Skill content
npm install -g agent-browser
agent-browser install
agent-browser install --with-deps
...
git clone https://github.com/vercel-labs/agent-browser
Recommendation

Verify the official npm package and repository before installing, pin a known-good version, prefer a trusted source link in metadata, and consider running the tool in a sandboxed environment.

What this means

The agent may be able to act with the permissions of the active browser session or supplied HTTP credentials.

Why it was flagged

The skill can work with authentication material and browser session state. This is purpose-aligned for browser automation, but it is sensitive authority.

Skill content
agent-browser set credentials user pass   # HTTP basic auth ... Recording creates a fresh context but preserves cookies/storage from your session.
Recommendation

Avoid using this on highly sensitive accounts unless necessary, use separate profiles or test accounts, and clear cookies/storage after sensitive tasks.

What this means

Private session data or site-controlled state may carry into later browsing, recordings, screenshots, or automated interactions.

Why it was flagged

Browser cookies and storage can persist into later contexts. This is disclosed and useful for automation, but persistent page state can expose private information or influence later actions.

Skill content
Recording creates a fresh context but preserves cookies/storage from your session.
Recommendation

Use isolated browser state for sensitive work, clear storage between unrelated tasks, and review generated screenshots, PDFs, and recordings before sharing.

What this means

Running JavaScript on a logged-in page can read or modify page content within that browser context.

Why it was flagged

The tool documents JavaScript execution in a browser page context. This is expected for testing and browser automation, but users should treat evaluated scripts as powerful on the loaded page.

Skill content
agent-browser eval --url https://example.com "document.title"
Recommendation

Only evaluate scripts you understand, especially on authenticated or sensitive websites.