OpenClaw Gemini Web
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill's requirements and instructions align with its stated purpose (browser-driven Gemini web interactions); the included TOTP helper is consistent with the login automation described and no unexpected network endpoints or unrelated credentials are requested.
This skill appears coherent: it is designed to control a hosted browser session for Gemini, optionally using credentials and a TOTP secret to automate login. Things to consider before installing: only provide GEMINI_WEB_* values if you trust the environment (these are sensitive); avoid pasting passwords/TOTP secrets into chat — use environment variables or a secure file the agent is explicitly permitted to read; the included scripts/totp.py is a local TOTP generator (no network calls) but can read a JSON file you point it to, so do not point it at unrelated secret stores. Verify you are comfortable with the agent accessing local files you upload and the output directory it will write to. If you need stricter control, keep autonomous invocation off for sessions that provide credentials or explicitly review the repository code yourself (homepage link) before use.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
No visible risk-analysis findings were reported for this release.
