OpenClaw Scrapling
MaliciousAudited by ClawScan on May 10, 2026.
Overview
This skill openly automates stealth web scraping that bypasses anti-bot protections and reuses login sessions, so it is unsafe to install casually.
Avoid installing this skill unless you specifically need authorized security/testing scraping against targets you control. If you do install it, disable stealth bypass by default, never pass real passwords on the command line, inspect and pin dependencies, and delete saved sessions/caches after each use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent could scrape protected websites in ways that violate site rules, trigger account/IP bans, or enable unauthorized data collection.
The skill explicitly instructs the agent to evade third-party anti-bot and anti-scraping controls, not merely to fetch pages.
Need to bypass Cloudflare, bot detection, or anti-scraping measures ... Bypasses Cloudflare Turnstile automatically ... Browser fingerprint spoofing
Do not install unless you have a legitimate, authorized need; require explicit user approval per target, disable stealth/CAPTCHA-bypass behavior by default, and restrict use to sites you own or are permitted to test.
Login credentials, bearer tokens, or session authority could be exposed through shell history/process listings or reused beyond the user's intended request.
The documented workflow passes website credentials on the command line and associates them with a reusable named session for arbitrary targets.
--username "user@example.com" --password "password123" --session-name "my-session"
Use a secret store or environment variables instead of command-line passwords, declare credential handling clearly, require per-site consent, and provide explicit session deletion controls.
Cookies or login state could persist across tasks and let the agent access protected content later without the user re-entering credentials.
Persistent authentication state is advertised, but the artifacts do not clearly bound storage, lifetime, encryption, or which future invocations may reuse it.
✅ **Session Management** - Persistent cookies, login state across requests
Make session persistence opt-in per site, store session data securely, show where it is saved, and provide simple commands to list and delete saved sessions.
A dependency update could change scraping, browser, or credential-handling behavior after installation.
The skill relies on external Python packages using minimum-version constraints, so future installs may pull versions that were not reviewed here.
scrapling[all]>=0.4.0 ... pyyaml>=6.0.0 ... requests>=2.28.0
Pin dependency versions, use a lockfile, and verify the upstream Scrapling package and browser downloads before installing.
