Back to skill
Skillv1.1.0
VirusTotal security
Anemone Browser · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 30, 2026, 4:50 AM
- Hash
- e5d7acde83e8e672cecd395b21b1a3422975ea2e32ff126223b53bb83111b95d
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: anemone-browser Version: 1.1.0 The skill provides a managed Chrome browser with VNC remote access and anti-detection features. It is classified as suspicious primarily due to the use of the `--no-sandbox` flag when launching Chrome in `scripts/start.sh`, which is a known security vulnerability that disables a critical browser security layer. Additionally, while a core feature, the VNC remote access (exposed via `websockify` in `scripts/start.sh` and instructed for agent use in `SKILL.md`) presents a high-risk capability, even with self-signed SSL and random passwords. There is no evidence of intentional malicious behavior like data exfiltration, unauthorized persistence, or covert remote execution; rather, the skill implements several security hardening measures such as binding CDP to localhost and applying Chrome policies to block `file://` access and disable DevTools.
- External report
- View on VirusTotal
