Perplexity Pro Openclaw

MaliciousAudited by ClawScan on May 10, 2026.

Overview

This skill is explicitly built to evade Cloudflare/bot protections while keeping a persistent authenticated browser session, and its VNC/session setup is unsafe for user accounts.

Avoid installing this skill on any account or machine you care about. Its primary function is to bypass bot protections, and it requires a persistent logged-in browser exposed through risky VNC/browser automation. If you still evaluate it, use an isolated disposable server and account, bind VNC to localhost through SSH, change all default passwords, and delete the browser profile when finished.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Your account could be used for automated activity on a protected service, which may violate service rules, trigger blocking, or create account-risk exposure.

Why it was flagged

The core advertised capability is evading a third-party anti-bot/security control while using an authenticated user session.

Skill content
This skill enables OpenClaw to search Perplexity PRO with persistent authenticated sessions, bypassing Cloudflare protection through undetectable browser automation.
Recommendation

Do not install tools whose purpose is to bypass Cloudflare or bot protections; prefer an official Perplexity API or another authorized integration.

What this means

Anyone who can reach the server may be able to attempt remote desktop access to the browser session and the logged-in account.

Why it was flagged

The documented VNC setup listens on all network interfaces, keeps running, and uses a public default password in the setup example.

Skill content
x11vnc -display :99 -rfbauth /tmp/vncpass -listen 0.0.0.0 -xkb -forever -shared ... Password: openclaw
Recommendation

Do not expose VNC publicly; if used at all, bind it to localhost, require a strong unique password, use an SSH tunnel, and firewall the port.

What this means

The OpenClaw environment and any process that can access the browser profile may be able to reuse your Google/Perplexity session.

Why it was flagged

The skill asks the user to authenticate with a full Google account and then retain that authenticated session for future automated use.

Skill content
Use your actual Google password (not App Password) ... Session persists permanently!
Recommendation

Avoid entering a primary Google account into this setup; use official scoped credentials where available, or at minimum use a dedicated account on an isolated machine.

What this means

Future agent tasks or local compromise could reuse the same authenticated browser state, and sensitive session data may remain after the intended task ends.

Why it was flagged

The launcher stores persistent browser state under the OpenClaw home directory and configures Chrome to use a basic password store, making long-lived cookies/session data available across runs.

Skill content
PROFILE_DIR="${HOME}/.openclaw/browser-profile" ... --user-data-dir=${PROFILE_DIR} ... --password-store=basic
Recommendation

Use a dedicated disposable profile and account, restrict file permissions, avoid saving passwords, and provide a clear logout/delete-profile cleanup path.

What this means

An authenticated automated browser may remain active after the user’s immediate task, increasing exposure if the host or profile is later accessed.

Why it was flagged

The script launches long-running Xvfb and Chrome processes in the background and exits after confirming Chrome is reachable, without a paired shutdown or containment workflow.

Skill content
Xvfb ${XVFB_DISPLAY} -screen 0 1920x1080x24 ... & ... google-chrome ... > "${LOG_FILE}" 2>&1 &
Recommendation

Require explicit start/stop controls, document cleanup commands, and avoid leaving authenticated browser automation running unattended.

What this means

Users must trust and correctly perform privileged system changes outside the registry’s declared requirements.

Why it was flagged

The privileged install steps are purpose-aligned for this browser automation setup, but they are manual, privileged, and not represented by an install spec or checksum-pinned package flow.

Skill content
wget https://dl.google.com/linux/direct/google-chrome-stable_current_amd64.deb
sudo dpkg -i google-chrome-stable_current_amd64.deb
sudo apt-get install -y Xvfb x11vnc
Recommendation

Verify package sources, prefer distribution-managed packages where possible, and review privileged install commands before running them.