Abby Browser

ReviewAudited by ClawScan on May 10, 2026.

Overview

Abby Browser mostly matches its browser-control purpose, but it deserves review because it gives broad page-control powers and one helper can turn a selector into executable browser JavaScript.

Install only if you want the agent to control a browser. Supervise it on logged-in, payment, admin, or publishing pages, and ask the author to escape selector inputs and make confirmation/logging enforceable rather than just documented.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A crafted selector could make the browser run unintended JavaScript in the active page, potentially reading page data, changing forms, navigating, or triggering actions beyond text extraction.

Why it was flagged

The selector argument is inserted into JavaScript without escaping and then executed through the browser evaluate command.

Skill content
js = f'document.querySelector("{selector}").innerText'
cmd = ['openclaw', 'browser', 'evaluate', '--fn', js]
Recommendation

Escape the selector with JSON encoding or avoid raw evaluate for selectors; require explicit confirmation for any evaluate-based action.

What this means

If used on a logged-in site, the agent could submit forms or make account changes if the user approves or if the agent is allowed to act too freely.

Why it was flagged

The wrapper can fill fields and optionally submit forms in the active browser session. This matches the browser-control purpose, but it can be high-impact on account, payment, publishing, or admin pages.

Skill content
cmd = ['openclaw', 'browser', 'fill', '--fields', fields_json]

    if submit:
        cmd.append('--submit')
Recommendation

Use this skill only with close supervision on sensitive sites, and require explicit user approval before form submission, purchases, posts, deletes, or account changes.

What this means

Users may over-trust the skill to prevent or record dangerous browser actions when those controls are not clearly enforced by the artifacts.

Why it was flagged

The skill makes safety assurances about confirmation and logging, but the provided scripts are immediate wrappers around browser commands and do not show an explicit approval or operation-log implementation.

Skill content
## 安全考虑

- ❌ 不自动执行危险操作
- ✅ 执行前确认
- ✅ 记录操作日志
Recommendation

Make confirmation and logging requirements explicit in executable code or platform configuration, and clarify which actions require approval.

What this means

Sensitive information visible in the browser may be exposed to the agent, and malicious webpage text could influence later agent behavior if trusted.

Why it was flagged

Page snapshot output is returned into the agent context. That is purpose-aligned for extraction, but the content can include private page data or untrusted webpage instructions.

Skill content
cmd = ['openclaw', 'browser', 'snapshot']
...
'content': result.stdout
Recommendation

Avoid snapshots on private pages unless needed, and treat extracted webpage text as untrusted content rather than instructions.

What this means

Users have less provenance information and may not know all local prerequisites before use.

Why it was flagged

The registry provides limited provenance and no install/dependency contract, while SKILL.md states dependencies on OpenClaw browser and Chrome/Chromium.

Skill content
Source: unknown
Homepage: none
...
Install specifications: No install spec — this is an instruction-only skill.
Recommendation

Publish a source/homepage link and declare the OpenClaw browser and Chrome/Chromium requirements in metadata.