Agent Browser
Analysis
Review before installing: this is a powerful browser-control skill that can reuse logged-in browser sessions and persist session tokens.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`allowed-tools: Bash(npx agent-browser:*), Bash(agent-browser:*)` and the description says it can fill forms, click buttons, login to a site, and automate any browser task.
This exposes a broad browser-control CLI to the agent, including actions that can change accounts or submit data on arbitrary websites. That is purpose-aligned, but it is not narrowly scoped or paired with explicit approval rules for high-impact actions.
Install via `npm i -g agent-browser`, `brew install agent-browser`, or `cargo install agent-browser`. Run `agent-browser install` to download Chrome. Run `agent-browser upgrade` to update to the latest version.
The skill depends on an external executable and browser download/update path that is not pinned in the artifacts. Combined with unknown registry source/homepage, users must verify the CLI provenance before granting it browser/session access.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
The fastest way to authenticate is to reuse cookies from a Chrome session you are already logged into ... `agent-browser --auto-connect state save ./my-auth.json` ... Any local process can connect and read cookies, execute JS, etc.
The skill documents importing authentication from a logged-in Chrome session via CDP. That gives the automation access to existing authenticated accounts and is not bounded to a specific site or account in the metadata.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`--session-name myapp` ... state auto-saved/restored; State files contain session tokens in plaintext -- add to `.gitignore` and delete when no longer needed.
The artifacts show persistent cookies/localStorage and state files that can contain plaintext session tokens. This creates reusable authentication state across runs and tasks.
