Agent Browser

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is a coherent browser-automation skill, but it relies on an unverified external CLI and includes powerful login/session, JavaScript, and proxy features that need careful review.

Install only if you trust the agent-browser CLI package and can pin/verify it. Be cautious with logins, saved auth-state files, arbitrary JavaScript, file uploads, and proxy-based scraping. Require explicit confirmation before the agent submits forms, changes account data, posts publicly, purchases anything, or performs large-scale scraping.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the external CLI package is compromised or different from expected, it could control browser sessions, handle credentials, capture pages, or persist auth state.

Why it was flagged

The skill permits running an external agent-browser CLI, including via npx. Combined with the provided metadata showing unknown source, no homepage, and no install spec, the executable that controls browser sessions is not pinned or reviewable in these artifacts.

Skill content
allowed-tools: Bash(npx agent-browser:*), Bash(agent-browser:*)
Recommendation

Use only a trusted, pinned version of the agent-browser CLI; avoid automatic npx execution unless you have verified the package source and integrity.

What this means

Using these workflows against third-party sites may violate terms of service, trigger account/IP blocks, or enable abusive scraping behavior.

Why it was flagged

The reference explicitly recommends proxy rotation to avoid rate limiting during scraping, which can bypass website abuse controls and exceed normal browser-automation use.

Skill content
### Rotating Proxies for Scraping

# Rotate through proxy list to avoid rate limiting
Recommendation

Use proxies only for legitimate testing or corporate routing, respect robots.txt/terms/rate limits, and require explicit user approval for scraping at scale.

What this means

JavaScript run in an authenticated page can read or change page data and may perform actions as the logged-in user.

Why it was flagged

The CLI supports arbitrary JavaScript execution in the browser context. This is a common browser-automation escape hatch, but it is powerful and should be used intentionally.

Skill content
agent-browser eval -b "<base64>"             # Any JavaScript (base64 encoded)
agent-browser eval --stdin                   # Read script from stdin
Recommendation

Prefer normal click/fill/get commands when possible, review JavaScript before running it, and avoid executing JS from untrusted pages or prompts.

What this means

An automated browser session can act as you on websites where you log in.

Why it was flagged

The skill documents entering account credentials and saving authenticated browser state. That is purpose-aligned for login automation, but it grants delegated account access.

Skill content
agent-browser fill @e1 "$APP_USERNAME"
agent-browser fill @e2 "$APP_PASSWORD"
...
agent-browser state save ./auth-state.json
Recommendation

Use least-privilege accounts where possible, avoid entering credentials unless needed, and confirm sensitive actions such as purchases, posts, deletions, or account changes.

What this means

Anyone or any process with access to saved state files may be able to reuse web sessions.

Why it was flagged

Saved session files can contain cookies and browser storage, which may include authentication tokens or other sensitive state reused across tasks.

Skill content
State File Contents

{
  "cookies": [...],
  "localStorage": {...},
  "sessionStorage": {...},
  "origins": [...]
}
Recommendation

Store state files outside shared repositories, encrypt or delete them when no longer needed, and clear sessions after sensitive work.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Browser state can remain active after a task unless closed or cleared.

Why it was flagged

The skill discloses background browser persistence between commands. This is useful for automation, but users should understand that browser/session state may outlive a single command.

Skill content
The browser persists between commands via a background daemon
Recommendation

Close sessions when finished and use the documented state/session cleanup commands for sensitive sites.