AIGroup Browser Skill
Analysis
The skill is coherent for opening real browser pages, but it uses live browser profiles and can expose existing browser tab titles or URLs, so it deserves careful review before installation.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
CN_CMD = "/home/jack/.local/bin/oc-cn" ... GLOBAL_CMD = "/home/jack/.local/bin/oc-global" ... AUTO_CMD = "/home/jack/.local/bin/oc-browser"
The reviewed package calls local helper binaries that are not included in the artifact contents, so the final browser-launch behavior depends on host-installed executables.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
profile state, region routing, or anti-bot behavior matter
The skill is designed to use existing real browser profiles rather than an isolated or unauthenticated fetch path, so opening a URL may involve the user's persistent browser identity or logged-in session state.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
data = fetch_json(f"http://127.0.0.1:{port}/json/list") ... return pages[0] if pages else None ... "title": (page.get("title") or "").strip(), "url": page.get("url", "")The script reads all page entries from the local browser CDP endpoint and, if no requested-host match is found, falls back to the first page before returning its title and URL.
