Back to skill
Skillv2.5.0
VirusTotal security
browserbase-sessions · External malware reputation and Code Insight signals for this exact artifact hash.
Scanner verdict
SuspiciousApr 29, 2026, 3:43 AM
- Hash
- 5755218480743eb3df28a76e8da12980dbb955d985a9fcc624debc27da3febe4
- Source
- palm
- Verdict
- suspicious
- Code Insight
- Type: OpenClaw Skill Name: browserbase-sessions Version: 2.5.0 The skill is classified as suspicious due to a significant JavaScript injection vulnerability in the `execute-js` command within `scripts/browserbase_manager.py`. This command allows arbitrary JavaScript code, provided via the `--code` argument, to be executed directly in the remote cloud browser session using `page.evaluate()`. While this is a feature of browser automation tools, it presents a high-risk attack surface where a malicious agent or user could exploit it to bypass same-origin policy, steal sensitive data from visited websites, or perform other unauthorized actions within the browser context. There is no clear evidence of intentional malicious behavior (e.g., data exfiltration to unauthorized endpoints, persistence mechanisms on the host system, or prompt injection against the OpenClaw agent itself) by the skill's developers, but the vulnerability is critical.
- External report
- View on VirusTotal
