Nextbrowser

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This skill openly enables autonomous logged-in browser automation with persistent cookies, residential proxies, browser stealth, and CAPTCHA solving, which is high-impact and lacks clear safety limits.

Review carefully before installing. This is not just a cloud browser helper: it is designed to automate logged-in online accounts using persistent sessions, proxies, stealth, CAPTCHA solving, and autonomous subagents. Only use it for authorized tasks, with narrow account/profile scopes and explicit approval before any session reuse or online action.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could automate logged-in online accounts in ways that are hard for websites to detect, potentially causing account bans, unwanted posts or changes, policy violations, or abuse of third-party services.

Why it was flagged

This combines autonomous account control with anti-detection infrastructure, residential proxies, and CAPTCHA solving. Those capabilities can bypass normal website protections and perform high-impact online actions without the artifact defining strong user-approval or scope limits.

Skill content
Primary use is creating browser sessions with profiles (persisted logins/cookies) that Openclaw can control to manage social media and other online accounts. Secondary use is running task subagents for fast autonomous browser automation under residential proxy, browser stealth, and CAPTCHA solving capability.
Recommendation

Only use this with explicit per-task approval, clear allowed sites/accounts/actions, and no stealth, proxy, or CAPTCHA-solving features unless you have a legitimate, authorized need.

What this means

If installed, the agent may use the Nextbrowser account and spend credits or access configured browser resources without the registry clearly signaling that credential requirement.

Why it was flagged

The skill requires a provider API key even though the registry metadata lists no primary credential or required config paths. This is sensitive delegated authority and is under-declared in the provided metadata.

Skill content
API Key is read from openclaw config at `skills.entries.next-browser.apiKey`.
Recommendation

Declare the API key as a credential/config requirement and ensure the user explicitly approves when the agent may use it, spend credits, or create browser sessions.

What this means

A later autonomous task could inherit an already logged-in session and act as the user on a website, even if the user did not intend that specific account/session to be reused.

Why it was flagged

Persistent browser state can carry sensitive login context from one task to another. The artifact does not clearly bound which accounts may be reused, how long the state is retained, or how reuse is approved.

Skill content
Profiles persist cookies and login state across browser sessions. Create one, log into your accounts in the browser, and reuse it.
Recommendation

Use separate profiles per account and task, require explicit confirmation before reusing a logged-in profile, and document deletion/retention controls.

ConcernMedium Confidence
ASI10: Rogue Agents
What this means

Autonomous browser workers could continue performing online actions or consuming provider credits unless the user carefully controls their scope and shutdown.

Why it was flagged

The skill advertises autonomous subagents, but the provided artifact does not define containment, stopping conditions, action approvals, or limits on what those subagents may do with logged-in browser profiles.

Skill content
Secondary use is running task subagents for fast autonomous browser automation
Recommendation

Require explicit user approval before starting any autonomous task/subagent, define maximum runtime and allowed actions, and always stop browser sessions when finished.