Back to skill
Skillv1.0.0
ClawScan security
automation browser · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
ReviewMar 14, 2026, 2:41 AM
- Verdict
- Review
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's code and instructions match its stated purpose (controlling a local QQ Browser kernel), but the included install scripts download and install native binaries and a Python wheel from remote URLs and start a background service — actions that raise moderate operational and supply-chain concerns that users should understand before installing.
- Guidance
- This skill appears to implement what it claims, but the installer will download and install native packages and a Python wheel and start a background service on your machine. Before you install: (1) Confirm the download URLs and package publisher (the script points at a QQ domain) and prefer signed releases or vendor instructions; (2) Run the installer in a VM or isolated environment first — the script may require root to run apt/dpkg/yum and will write to /usr/local and create a background process; (3) Be cautious about pip3 --break-system-packages which can alter system-managed Python packages; (4) Understand that the x5use binary will run a local SSE server on port 18009 — if other services expose that port it could be reachable; (5) If you need stricter safety, avoid running the install script as root, review the x5use binary source or obtain it from a verifiable upstream, or prefer a sandbox/container deployment. If you want, I can point out exact lines that start processes, download files, or create system paths, or help draft a safer install plan (containerized or with checksum verification).
Review Dimensions
- Purpose & Capability
- okName/description align with what the files do: Python wrappers call a local MCP (x5use) service to automate a browser. The required binary (python3) and provided scripts are coherent with browser automation.
- Instruction Scope
- okSKILL.md clearly documents installing QQ Browser and the x5use service, starting the service, and running per-action scripts. The runtime instructions do not request unrelated files or credentials and confine actions to the local MCP service and browser automation tasks.
- Install Mechanism
- concernInstallation uses an included shell script that downloads .deb/.rpm and a .whl from a remote URL and runs dpkg/apt/yum and pip3 (--break-system-packages). Although the download host appears to be a QQ domain, the pattern (curl + dpkg/yum + pip install of a wheel) is a higher-risk supply-chain operation because it installs native binaries and third-party Python code on the host.
- Credentials
- okThe skill requests no environment variables or unrelated credentials. It does require the ability to write system directories (creating /usr/local/qb_logs) and to install system packages, which is proportionate to installing a browser and service but does require elevated filesystem and package-manager access.
- Persistence & Privilege
- noteThe skill will start (and can start) a persistent background binary service (x5use-linux-mcp) that listens on localhost:18009 and creates a log directory under /usr/local. This is expected for local automation but increases the attack surface (a native binary running as a background process). 'always' is false and agent autonomy is default (no special gating).
