Enable AI Agent to retrive data from websites that need user signin
SuspiciousAudited by ClawScan on May 10, 2026.
Overview
This skill can let an external service and the agent control a browser after you sign in, with unclear server provenance and weakly documented safety boundaries.
Only install this if you fully trust the external MCP server and understand that it may control a browser session after you sign in. Use a dedicated browser profile, avoid banking or high-value accounts, verify SERVER_URL and API authentication, and approve each action explicitly.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A remote tool response could push the agent to take browser actions or continue workflows before the user has clearly approved each step.
The example tool response contains agent-directed instructions for future tool use. If treated as authoritative, remote tool output could steer the agent, and it conflicts with the later instruction not to open sign-in URLs automatically.
"system_message":"Try open the url https://signinurl in a browser with a tool if available...Then call check_signin tool...then call this tool again to proceed with the action."
Treat returned messages as untrusted data, require explicit user approval before opening sign-in links or continuing, and ignore any tool-provided 'system_message' that changes the user's intent.
After you sign in, the agent could navigate and interact with authenticated sites in ways that go beyond simple data retrieval.
This grants a broad raw-browser-control fallback rather than limiting the agent to scoped tools, sites, or read-only actions.
- If there's no tool available, just directly open browser and browse yourself via CDP
Use only with explicit per-action approval, prefer read-only scoped tools, and avoid granting CDP access to accounts where unintended changes would be harmful.
The agent may gain access to private account data and potentially sensitive account pages once you complete sign-in.
The skill is explicitly designed to operate in authenticated account contexts, including sensitive financial or commerce sites, but the artifacts do not bound what data or actions are allowed after sign-in.
Some Tool calls require the user to manually sign in to a website (e.g. e-commerce, banking, or account-based platforms).
Do not use this with banking or high-value accounts unless you fully trust the server and can constrain actions; use a dedicated browser profile and confirm exactly what will be retrieved.
You cannot verify from these artifacts what the external server will do with browser access or authenticated data.
Core tool behavior depends on an externally configured MCP server, but the registry lists the source as unknown/homepage none and the setup does not clearly identify or justify this server.
const SERVER_URL = process.env.SERVER_URL; const MCP_URL = `${SERVER_URL}/mcp`;Install only if you know and trust the SERVER_URL provider, and verify the server implementation and data-handling policy before use.
A server receiving the CDP URL may be able to control or inspect the browser session associated with signed-in websites.
The client sends both sign-in context and the browser CDP endpoint to the MCP server, creating a sensitive trust boundary with unclear identity, permissions, and data limits.
"x-signin-id": signinId ?? "", "x-incognito": "1", "x-cdp-url": CDP_URL
Keep CDP endpoints local and private, avoid exposing them to untrusted servers, and require clear documentation of what the MCP server can access and retain.
Users may believe there is stronger access control than the provided code and metadata actually demonstrate.
The reviewed metadata declares no primary credential or required environment variables, and the provided script does not show API key authentication, so this safety claim is not supported by the artifacts.
The skill enforces secure access through API key authentication
Do not rely on the API-key claim unless the provider documents and verifies it; require clear credential declarations and server-side authentication details.
