OpenClaw Scrapling

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This skill openly automates stealth web scraping that bypasses anti-bot protections and reuses login sessions, so it is unsafe to install casually.

Avoid installing this skill unless you specifically need authorized security/testing scraping against targets you control. If you do install it, disable stealth bypass by default, never pass real passwords on the command line, inspect and pin dependencies, and delete saved sessions/caches after each use.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could scrape protected websites in ways that violate site rules, trigger account/IP bans, or enable unauthorized data collection.

Why it was flagged

The skill explicitly instructs the agent to evade third-party anti-bot and anti-scraping controls, not merely to fetch pages.

Skill content
Need to bypass Cloudflare, bot detection, or anti-scraping measures ... Bypasses Cloudflare Turnstile automatically ... Browser fingerprint spoofing
Recommendation

Do not install unless you have a legitimate, authorized need; require explicit user approval per target, disable stealth/CAPTCHA-bypass behavior by default, and restrict use to sites you own or are permitted to test.

What this means

Login credentials, bearer tokens, or session authority could be exposed through shell history/process listings or reused beyond the user's intended request.

Why it was flagged

The documented workflow passes website credentials on the command line and associates them with a reusable named session for arbitrary targets.

Skill content
--username "user@example.com" --password "password123" --session-name "my-session"
Recommendation

Use a secret store or environment variables instead of command-line passwords, declare credential handling clearly, require per-site consent, and provide explicit session deletion controls.

What this means

Cookies or login state could persist across tasks and let the agent access protected content later without the user re-entering credentials.

Why it was flagged

Persistent authentication state is advertised, but the artifacts do not clearly bound storage, lifetime, encryption, or which future invocations may reuse it.

Skill content
✅ **Session Management** - Persistent cookies, login state across requests
Recommendation

Make session persistence opt-in per site, store session data securely, show where it is saved, and provide simple commands to list and delete saved sessions.

What this means

A dependency update could change scraping, browser, or credential-handling behavior after installation.

Why it was flagged

The skill relies on external Python packages using minimum-version constraints, so future installs may pull versions that were not reviewed here.

Skill content
scrapling[all]>=0.4.0 ... pyyaml>=6.0.0 ... requests>=2.28.0
Recommendation

Pin dependency versions, use a lockfile, and verify the upstream Scrapling package and browser downloads before installing.