Back to skill
Skillv1.0.0

ClawScan security

BrowserMCP Skill · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousFeb 25, 2026, 2:22 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill is internally coherent for local browser automation but contains several practices that increase risk (using the user's real browser profile, examples that automate credentials/2FA, and reliance on npx-installed code) and should be used only after the user verifies the extension/package sources and consents to sensitive actions.
Guidance
This skill appears to do what it says (control your real browser via a local MCP server + Chrome extension), but that capability is powerful and sensitive. Before installing or using it: - Verify the extension and MCP package provenance: prefer the Chrome Web Store entry and the official npm/GitHub repository (browsermcp.io / github.com/browsermcp). Inspect extension permissions and the npm package (source, recent releases, maintainers) if possible. - Understand the privacy impact: the extension can access the active tab, your cookies, and logged-in sessions. Any automation can perform actions on your behalf (post, purchase, read private data). Only run automation you explicitly approve. - Be cautious with credentials and 2FA: avoid typing real passwords or recovery codes into automated flows unless you fully trust the environment — prefer manual entry or using an isolated browser profile for automation. - Treat npx usage as remote code execution: npx @browsermcp/mcp@latest will fetch and run third-party code on your machine. If you need stronger assurance, install the package locally, audit it, or use pinned versions rather than @latest. - 'Stealth' and CAPTCHA-bypass claims increase misuse risk: consider policy and legal implications before automating actions intended to evade bot detection. If you want a safer setup, ask the skill author for: (1) links to the specific npm package and extension source code, (2) an option to run against an isolated browser/profile (not your default profile), and (3) explicit guidance that forbids automated entry of secrets or automated purchases without user confirmation.

Review Dimensions

Purpose & Capability
okName/description align with the instructions and included references: the skill controls a local MCP server + Chrome extension to automate an existing browser session. Requested resources (npx @browsermcp/mcp via template) are consistent with this purpose.
Instruction Scope
noteSKILL.md focuses on browser automation tools (navigate, snapshot, click, type, screenshot, get_console_logs) and stays within that domain. However, it explicitly instructs actions that can access authenticated sessions (login flows, OAuth, 2FA) and includes examples that type passwords/2FA codes — even if it sometimes recommends manual entry. It also claims 'stealth' and 'bypass common bot detection/CAPTCHAs', which widens potential for misuse.
Install Mechanism
noteThere is no install spec in the package itself, but templates and setup docs instruct adding an MCP server configured to run `npx @browsermcp/mcp@latest`. Using npx/npm to pull and run a remote package is a common pattern for MCP tools but is a moderate-risk install mechanism (remote code executed on the user's machine). No obscure URLs or shorteners are used in documentation; references point to browsermcp.io, GitHub and the Chrome Web Store when available.
Credentials
noteThe skill declares no required env vars or credentials, which is proportionate. However, the guidance and examples show automating passwords/2FA and using the user's existing browser profile (cookies, sessions). That implicitly grants the skill access to sensitive credentials and account sessions via the extension — expected for this capability but high sensitivity in practice. The SKILL.md does not define or require secure handling/storage of secrets.
Persistence & Privilege
okNo 'always: true' or other elevated persistence or system-wide config changes are requested. The skill is instruction-only and does not request persistent platform-level privileges. It does instruct the user to install a browser extension and run an MCP server locally, which are normal for this functionality.