Nextbrowser
Analysis
This skill is a review item because it can run autonomous cloud browsers using persistent logged-in account sessions, proxies, stealth, and CAPTCHA-solving features.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Primary use is creating browser sessions with profiles (persisted logins/cookies) that Openclaw can control to manage social media and other online accounts. Secondary use is running task subagents for fast autonomous browser automation under residential proxy, browser stealth, and CAPTCHA solving capability.
This describes broad autonomous browser/account automation, including stealth, residential proxy, and CAPTCHA-solving features, without visible guardrails for user approval or safe account mutation.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Profiles persist cookies and login state across browser sessions. Create one, log into your accounts in the browser, and reuse it.
Persistent cookies and login state let the cloud browser act as the logged-in user across sessions, which is high-impact delegated account authority.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
The Credentials Manager securely stores and reuses authentication data across browser runs and autonomous tasks.
Authentication data is stored and reused persistently across runs and tasks; the artifact does not describe retention limits, isolation boundaries, or how users review and remove reused auth state.
