OpenClaw浏览器自动化配置

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This is a coherent browser-automation setup guide, but its recommended default can expose an unauthenticated browser-control port, so it should be reviewed and hardened before use.

Use this skill only if you intentionally want OpenClaw to control a CDP browser. Before following the Docker command, restrict port 9222 to localhost or a trusted private network, avoid exposing CDP publicly, pin the Docker image version, and protect any Browserless.io API key stored in configuration.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

If the host or remote server is reachable by others, an unauthorized party may be able to control the headless browser or observe browser activity.

Why it was flagged

The recommended command publishes the Chrome DevTools Protocol port from the container to the host. CDP is a browser-control interface, and the guide does not specify localhost-only binding, authentication, firewalling, VPN, or SSH tunneling.

Skill content
docker run -d --name browser-auto -p 9222:9222 --shm-size=512m chromedp/headless-shell:latest
Recommendation

Bind the port to localhost, for example `-p 127.0.0.1:9222:9222`, or protect it with firewall/VPN/SSH tunneling and only expose CDP to trusted clients.

What this means

Future installs may run a different browser image than the one originally reviewed or tested.

Why it was flagged

The setup uses an external Docker image with the mutable `latest` tag. This is purpose-aligned for a Docker-based browser setup, but the exact image version can change over time.

Skill content
chromedp/headless-shell:latest
Recommendation

Pin the Docker image to a specific version or digest when stability and reviewability matter.

What this means

Anyone who can read or leak this configuration value may be able to use the Browserless service under the user’s account.

Why it was flagged

The optional Browserless.io configuration uses an API key in the CDP URL. This is expected for the cloud browser provider, but it is still a credential that grants access to the user’s Browserless account.

Skill content
"cdpUrl": "https://production-sfo.browserless.io?token=<API_KEY>"
Recommendation

Treat the token as a secret, restrict file permissions on the OpenClaw config, and rotate the token if it may have been exposed.

What this means

Pages, URLs, form inputs, and session activity handled by the cloud browser may be visible to or processed by the provider.

Why it was flagged

The guide includes an option to route browser automation through a third-party cloud browser provider. This is disclosed and purpose-aligned, but it changes the data boundary for browsing activity.

Skill content
连接browserless.io云服务
Recommendation

Use the cloud option only for data you are comfortable processing through that provider, and prefer local or private browser infrastructure for sensitive sessions.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Browser automation may continue to be available to OpenClaw until the user stops the container or disables the profile.

Why it was flagged

The browser runs as a detached container, and the guide also enables a persistent browser profile in OpenClaw configuration. This is disclosed and aligned with the setup purpose, but it remains active after initial configuration.

Skill content
docker run -d --name browser-auto ...
Recommendation

Stop or remove the container and disable the OpenClaw browser profile when browser automation is no longer needed.