Chrome

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: chrome Version: 1.0.0 The skill bundle contains standard metadata and a detailed markdown file (`SKILL.md`) providing technical guidance and best practices for interacting with Chrome DevTools Protocol and Chrome Extension Manifest V3. The instructions focus on correct implementation, security considerations (e.g., avoiding broad permissions, handling secure contexts), and debugging patterns. There is no evidence of data exfiltration, malicious execution, persistence mechanisms, prompt injection attempts against the agent, or obfuscation. All content aligns with the stated purpose of a 'Chrome' skill.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent applies this guidance to an active Chrome debugging session, it could navigate pages or evaluate JavaScript in the selected tab.

Why it was flagged

CDP commands can control or inspect a browser tab. In this artifact they are presented as debugging guidance, not hidden automation, so this is a purpose-aligned note rather than a concern.

Skill content
`Runtime.enable` and `Page.enable` must be called before any `Runtime.evaluate` or `Page.navigate` commands.
Recommendation

Use this skill only for intended Chrome debugging tasks and review any proposed CDP actions before applying them to sensitive browser sessions.