Browser Ladder

WarnAudited by ClawScan on May 10, 2026.

Overview

Review before installing: the skill is mostly transparent browser automation, but it explicitly enables CAPTCHA/bot-protection bypass, can route browsing through paid cloud services, and runs an unpinned runtime helper.

Install only if you need browser automation and are comfortable with Docker, cloud browser providers, and the stated bypass capabilities. Do not use the CAPTCHA/Cloudflare/OAuth/MFA rung unless you have authorization and trust Browserless with the resulting data. Consider forcing lower levels, skipping cloud tokens, and waiting for the BrowserCat rung and runtime dependencies to be clarified.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could be used to bypass website protection mechanisms, which may violate site rules or create legal and account-risk exposure.

Why it was flagged

The skill explicitly frames Browserless as a way to bypass CAPTCHA, Cloudflare, and bot-detection controls, not just render pages.

Skill content
L4 (Browserless.io for CAPTCHA/bot bypass) ... | CAPTCHA/Cloudflare | 4 | Bot bypass needed |
Recommendation

Use this only on sites and workflows where you have authorization; the skill should add explicit approval and acceptable-use guidance before any CAPTCHA, Cloudflare, or bot-bypass attempt.

What this means

Users may believe the tool will try a free cloud rung before paid Browserless, but the actual script can reach the paid rung sooner than expected.

Why it was flagged

The free BrowserCat fallback described by the skill is not implemented, so the ladder can skip from local Docker failure to paid Browserless when a token is available.

Skill content
# TODO: Implement BrowserCat API
  return 1
Recommendation

Implement BrowserCat before advertising it as an active rung, or update the documentation and require explicit confirmation before paid Browserless use.

What this means

A browsing request may run npm code that was not reviewed with the skill, even though it is inside a Docker container.

Why it was flagged

This executes a package fetched by npx at runtime without a pinned version or declared provenance.

Skill content
npx -y playwright-cli-extra content "$URL"
Recommendation

Pin the package version, declare it clearly, vendor the helper, or replace it with reviewed Playwright code included in the skill.

What this means

Sensitive authentication pages or sessions could be processed by a third-party cloud browser if the agent uses this rung for login flows.

Why it was flagged

The documentation directs complex OAuth/MFA flows to a cloud browser provider without describing credential, session, or data-boundary protections.

Skill content
Rung 4: Browserless.io (Cloud Paid) ... | OAuth/MFA flows | 4 | Complex auth |
Recommendation

Avoid using cloud browser rungs for sensitive login, OAuth, or MFA unless you explicitly trust the provider; add warnings, allowlists, and per-use approval for authenticated flows.

What this means

Anyone or anything with access to that .env file may be able to use the configured browser service tokens.

Why it was flagged

The setup script asks for optional provider tokens and saves them in the workspace .env file.

Skill content
read -p "Browserless Token (or press Enter to skip): " BROWSERLESS_KEY ... echo "BROWSERLESS_TOKEN=$BROWSERLESS_KEY" >> "$ENV_FILE"
Recommendation

Only enter tokens you intend the agent to use, protect the .env file, and skip BrowserCat/Browserless setup unless you need those rungs.