Claude Chrome

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: claude-chrome Version: 1.0.0 The skill instructs the AI agent to execute the `claude` binary with the `--dangerously-skip-permissions` flag, which is explicitly stated to "auto-approve all actions." While presented as necessary for automation, this flag grants broad, unchecked capabilities to the `claude` tool. This significantly increases the risk of a subsequent malicious prompt to the agent being able to perform unauthorized actions (e.g., data exfiltration, arbitrary browser interaction, or local file access) without user intervention, even though the skill itself does not contain explicit malicious instructions or IOCs. This risky capability is highlighted multiple times in SKILL.md.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could click, navigate, submit forms, or perform other browser actions without stopping for confirmation.

Why it was flagged

The skill instructs use of a permission-bypass flag as the standard workflow for browser automation, removing per-action approval for a tool that can interact with web pages.

Skill content
`--dangerously-skip-permissions` — auto-approve all actions (required for automation); `Always use --dangerously-skip-permissions for automated runs`
Recommendation

Use this only for narrow, trusted tasks. Prefer a dedicated browser profile or test account, and avoid auto-approval for sensitive sites or actions that can post, purchase, change settings, or submit data.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

If Chrome is signed in to websites, the automation may act within those web sessions or read page content available to that browser context.

Why it was flagged

The skill relies on delegated Chrome extension permissions and gives Claude Code broad browser interaction authority, but does not define domain, profile, account, or action boundaries.

Skill content
Claude Code gains browser tools — it can navigate pages, click elements, fill forms, read content, and more. ... Domain permissions ... may require user approval for new domains
Recommendation

Grant domain permissions deliberately, use a separate Chrome profile with minimal logins, and avoid running this against accounts or pages where unintended clicks or form submissions would matter.

ConcernHigh Confidence
ASI10: Rogue Agents
What this means

A browser task may keep operating after the user thinks it failed or timed out.

Why it was flagged

The skill normalizes browser automation continuing after an apparent command error or timeout, without clear stop, kill, or monitoring instructions.

Skill content
Commands will error immediately but continue running in the background. Results arrive via system messages when complete. ... Be aggressive with timeouts - commands complete in background even after gateway timeout
Recommendation

Add explicit process monitoring and cancellation steps, avoid long-running background browser sessions, and confirm completion before starting sensitive follow-up tasks.

What this means

The safety of the workflow depends on the separately installed Claude Code CLI and Chrome extension, which were not reviewed here.

Why it was flagged

The skill itself is instruction-only and depends on an external Claude Code binary, while the registry metadata does not provide a source or homepage for provenance review.

Skill content
Source: unknown; Homepage: none; Required binaries (at least one): claude
Recommendation

Install Claude Code and its Chrome extension only from trusted official sources and keep them updated.