Web Scraper Jina

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only scraper openly promotes bypassing Cloudflare/Turnstile protections and scraping any site through a third-party service, which needs careful review before use.

Review carefully before installing. This skill has no code or install-time behavior, but its instructions encourage using r.jina.ai to bypass Cloudflare/Turnstile and scrape arbitrary sites. Only use it on public content you are authorized to scrape, and never send private, internal, signed, or token-containing URLs through the external service.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could attempt to access or scrape sites in ways that violate site rules, legal restrictions, or anti-abuse protections.

Why it was flagged

The skill's core capability is explicitly framed as bypassing anti-bot and site-protection mechanisms, not merely retrieving ordinary public pages.

Skill content
Bypass Cloudflare, Turnstile, and other protections
Recommendation

Use only for sites you are authorized to access and scrape. Do not use it to bypass CAPTCHA, Cloudflare, Turnstile, login walls, paywalls, or other protections without permission.

What this means

The agent may treat arbitrary user-provided or discovered URLs as scrape targets, including protected or sensitive pages.

Why it was flagged

The instruction is very broad and does not define safe target scope, authorization requirements, rate limits, or exclusions for private/protected pages.

Skill content
Simply prepend `https://r.jina.ai/` to any URL
Recommendation

Require explicit user approval for each target domain or URL, limit use to public authorized content, and add guidance about robots.txt, terms of service, and privacy-sensitive URLs.

What this means

If a private, internal, signed, or token-bearing URL is used, the URL may be exposed to the external scraping provider.

Why it was flagged

The skill routes target URLs through a third-party service, so r.jina.ai can observe the requested URL and potentially associated query parameters.

Skill content
return requests.get(f"https://r.jina.ai/{url}").text
Recommendation

Do not send URLs containing secrets, session tokens, private document links, intranet hosts, or sensitive query parameters through this service.