ClawMe

WarnAudited by ClawScan on May 10, 2026.

Overview

ClawMe is a disclosed browser-automation skill, but it can use your logged-in Chrome sessions to post, email, click, fill forms, and extract page content through an external service.

Install this only if you intentionally want an agent to control your real Chrome browser. Use a separate browser profile, keep sensitive accounts signed out, verify every action before executing it, and understand where the ClawMe token, instructions, and extracted page content are sent.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If misused or reviewed too quickly, the agent could queue actions that change accounts, submit forms, or publish content in the user's real browser.

Why it was flagged

The skill exposes broad browser actions that can create public posts, draft or send emails, fill and submit forms, click arbitrary page controls, and chain actions into workflows.

Skill content
Fill forms, tweet, email, click, extract ... compose_tweet ... compose_email ... fill_form ... click ... User sees a workflow card with progress bar and can execute all steps sequentially.
Recommendation

Use only when you intend browser automation, carefully review every side-panel action before executing it, and avoid one-click multi-step workflows for sensitive sites.

What this means

Actions may occur with your existing logged-in permissions on email, social media, business, financial, or other sensitive websites.

Why it was flagged

The automation operates with whatever accounts are already logged into Chrome, but the artifacts do not bound which sites, accounts, or session privileges may be used.

Skill content
Unlike headless browsers, ClawMe runs in the user's real browser with their actual login sessions.
Recommendation

Prefer a dedicated Chrome profile with only the accounts needed, sign out of unrelated sensitive sites, and rotate or revoke the ClawMe token when not in use.

What this means

Private page text or data visible in your logged-in browser could be sent back through the service and into the agent context.

Why it was flagged

Instructions and extracted browser content are routed through a ClawMe backend by default, and the artifacts do not describe data retention, origin validation, or limits on what extracted page content can be returned.

Skill content
POST ${CLAWME_BASE_URL:-https://api.clawme.net}/v1/instructions ... X-ClawMe-Token: ${CLAWME_CLIENT_TOKEN} ... Result (extracted text) is reported back to the agent.
Recommendation

Do not use extraction on sensitive pages unless you trust the backend and understand its data handling; consider using the local backend URL if available.

What this means

You cannot verify from these artifacts how the extension or backend enforces confirmation, protects tokens, or handles extracted browser data.

Why it was flagged

The supplied package does not include the Chrome extension or backend implementation that will receive the token and browser instructions, so those components are outside this artifact review.

Skill content
Source: unknown; Homepage: none; No code files present — this is an instruction-only skill.
Recommendation

Install the extension only from a trusted source, review its permissions, and verify the provider's security and privacy documentation before connecting real accounts.