Anti-Detect Browser

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This skill is designed for stealthy multi-account browser automation that evades anti-bot checks and cloud-syncs logged-in browser sessions.

Do not install this skill unless you intentionally need a vetted anti-detect browser for authorized testing and accept the risks. It can evade website bot protections, automate multiple identities, store logged-in sessions in a third-party cloud, and stream browser screens to shareable URLs. If used at all, isolate it, use non-sensitive test accounts, disable live view, restrict MCP access, audit and pin the npm package, and require human approval for account actions.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could use this to evade website protections, operate multiple identities, scrape at scale, or perform account activity that may violate site rules and expose the user to bans or liability.

Why it was flagged

The skill’s core capability is to hide automated browser sessions behind realistic fingerprints and bypass bot-detection systems, especially for multi-account automation.

Skill content
anti-detect browsers with unique real-device fingerprints for multi-account operations, web scraping ... passing even advanced anti-bot checks
Recommendation

Do not install for general agent use. Only consider it in tightly controlled, explicitly authorized testing environments with clear site permission and human approval for actions.

What this means

Sensitive accounts used in these browsers could remain logged in across machines, and compromised API keys or profiles could expose those sessions.

Why it was flagged

Cookies and session storage can act like credentials; storing and replaying them from the cloud gives the provider and any holder of the relevant profile/API access a way to reuse logged-in sessions.

Skill content
Profiles save cookies, localStorage, and session data to the cloud. Same profile name = same logged-in state next time, even across machines.
Recommendation

Avoid using sensitive personal, financial, or production accounts. If used at all, use low-privilege test accounts, clear profiles, rotate credentials, and verify the provider’s retention and access controls.

What this means

A connected agent could browse, interact with logged-in accounts, capture page contents, and operate under persistent browser profiles.

Why it was flagged

The artifacts expose powerful browser-control capabilities to AI agents through MCP, but do not describe identity checks, permission scoping, or per-action approvals.

Skill content
MCP server mode lets AI agents launch, navigate, screenshot, and interact with fingerprint browsers through tool calls.
Recommendation

Do not expose this MCP server to untrusted agents. If deployed, restrict it to a trusted local environment, use tool allowlists, and require human approval before account actions.

What this means

Sensitive browsing activity, account pages, messages, or personal data could be visible to anyone who receives or discovers the live-view URL.

Why it was flagged

Live browser screens may contain private content or logged-in account pages, and the artifact says the view URL can be shared so anyone with it can watch.

Skill content
Stream any headless session to the antibrow.com dashboard. Share the URL — anyone can watch the browser screen live.
Recommendation

Keep live view disabled for sensitive sessions, avoid sharing view URLs, and require strong access controls before streaming browser activity.

What this means

The external package would run locally with browser-control capability and access to the provided API key, so package compromise or misbehavior could affect sessions and accounts.

Why it was flagged

The skill relies on installing and executing an external npm package as an MCP server with an API key, while the provided artifact set contains no reviewed implementation or pinned package version.

Skill content
npm install anti-detect-browser ... "command": "npx", "args": ["anti-detect-browser", "--mcp"], "env": { "ANTI_DETECT_BROWSER_KEY": "your-api-key" }
Recommendation

Do not run the npm/npx commands without independently verifying the package source, pinning versions, auditing dependencies, and isolating execution from sensitive accounts.