Anemone Browser

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This skill is explicitly designed to run a persistent remote-controlled Chrome that evades website bot protections and CAPTCHA/Cloudflare blocking, while also exposing sensitive browser sessions through VNC.

Avoid installing this on your main machine or using it with important accounts. If you must test it, use a disposable container or VPS, firewall the noVNC port, avoid logging into sensitive services, rotate passwords, and remove the cron job/profile when finished.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may use the browser to bypass website anti-abuse protections, which can violate site rules and expose the user to account or legal risk.

Why it was flagged

The skill is not just enabling browser automation; it explicitly configures the browser to avoid bot-detection signals and continue through CAPTCHA or Cloudflare-style blockers.

Skill content
Use when: ... browser gets blocked by Google, Cloudflare, or CAPTCHAs ... Anti-Detection ... --disable-blink-features=AutomationControlled ... UA override via CDP
Recommendation

Do not install this for general browsing automation; only consider it in an isolated environment and for sites where you have explicit permission to automate.

What this means

A crafted argument, or an agent mistake when invoking the CLI, could cause unintended local shell commands to run.

Why it was flagged

CLI-provided values such as password, ports, and resolution are interpolated into a shell command without evident validation or safe argument passing.

Skill content
execSync(`bash ${join(SCRIPTS_DIR, 'start.sh')} "${password}" ${novncPort} ${cdpPort} ${resolution}`
Recommendation

Replace shell-string execSync calls with spawn/execFile argument arrays and validate ports, display numbers, and resolution before use.

What this means

Anyone who obtains the link may be able to control the browser and access any logged-in websites in that Chrome profile.

Why it was flagged

The remote-control password is embedded directly in a URL intended to be shared, which can leak through chat history, browser history, logs, screenshots, or referrers.

Skill content
echo "  noVNC:    https://<YOUR_IP>:${NOVNC_PORT}/vnc.html?password=${VNC_PASS}&autoconnect=true&resize=scale"
Recommendation

Avoid putting passwords in URLs; use short-lived credentials, restrict access by network allowlist/VPN, and rotate the VNC password after each takeover.

What this means

If the agent, VNC link, local machine, or browser profile is compromised, logged-in accounts in the persistent Chrome profile may be exposed or misused.

Why it was flagged

The browser profile intentionally preserves authenticated sessions across restarts and is controlled by both the agent and human VNC takeover flow.

Skill content
Persistent — Cookies and login sessions survive restarts
Recommendation

Do not log into sensitive accounts in this browser profile; use a dedicated low-privilege account and clear the profile when finished.

What this means

The browser/VNC stack may keep running and recovering in the background even after the original task is done, increasing exposure time.

Why it was flagged

Starting the environment installs a cron job that repeatedly restarts browser and VNC components, keeping the remote-control environment alive.

Skill content
CRON_CMD="*/2 * * * * bash $HC_DST $DISPLAY_NUM $VNC_PORT $NOVNC_PORT $CDP_PORT >> /tmp/anemone-healthcheck.log 2>&1"
Recommendation

Run `anemone stop`, verify the crontab is clean, and use this only in disposable containers or hosts with strict firewall rules.

What this means

On a non-dedicated Linux machine, stopping Anemone could terminate unrelated Chrome sessions and lose user work.

Why it was flagged

The stop command kills any process matching chrome, not only the Anemone-managed Chrome process.

Skill content
run('pkill -9 -f "chrome" 2>/dev/null || true', { ignoreError: true });
Recommendation

Scope process cleanup to recorded Anemone PIDs or the specific managed profile/remote-debugging command line.