Exposed secret literal
- Finding
- File appears to expose a hardcoded API secret or token.
Security checks across static analysis, malware telemetry, and agentic risk
This instruction-only skill is designed to automate CAPTCHA-protected logins with browser scripting and passwords, which can bypass security controls on arbitrary websites.
Review carefully before use. Only use this on websites or internal systems where you have explicit permission to automate CAPTCHA-protected logins, manually verify the target URL, approve each credential submission, and delete any saved screenshots afterward.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent could automate logins in ways a website is explicitly trying to prevent, including submitting credentials and CAPTCHA attempts without enough human oversight.
This directs the agent to use browser tooling to solve a CAPTCHA and submit a login, which can bypass an anti-automation security control on arbitrary sites.
employs AI vision to recognize CAPTCHA codes, automatically fills in account credentials and CAPTCHA, and completes the login operation
Use only on systems you own or are explicitly authorized to automate, and require manual confirmation before submitting credentials or CAPTCHA responses.
Passwords or privileged accounts could be submitted to the wrong site or used beyond the user's intended authorization boundary.
The workflow depends on account credentials and an arbitrary target login page, but it does not define authorization limits, target restrictions, or how credential use is controlled.
Target login page URL; Valid account credentials (username and password)
Provide credentials only for trusted, authorized targets, verify the URL manually, and avoid using privileged accounts unless absolutely necessary.
A user may be led to approve repeated automated login attempts that violate site rules, trigger account lockouts, or bypass security protections.
The wording frames avoidance of login security mechanisms as a normal best practice, which may encourage unsafe trust in automation that evades protective controls.
Be aware of system login rate limits to avoid triggering security mechanisms
Do not use this skill to evade rate limits, CAPTCHA protections, or other anti-abuse controls; prefer manual login or administrator-approved automation.
Sensitive information may remain in screenshot files or model context after the login attempt.
The workflow stores login-page screenshots for AI vision; such screenshots can contain sensitive page, account, or session information even though this is disclosed and purpose-aligned.
mcp_chrome-devtools-mcp_take_screenshot({ "filePath": "path/to/login_screenshot.png" })Save screenshots only in safe locations, delete them after use, and avoid capturing pages that reveal unnecessary private data.