Pinchtab

WarnAudited by ClawScan on May 10, 2026.

Overview

PinchTab is a disclosed browser automation skill, but it warrants review because it can use logged-in browser sessions and includes CAPTCHA/Cloudflare solving and stealth options.

Install only if you intentionally want an agent to control a browser. Use a dedicated low-privilege profile, keep eval/download/upload/stealth/challenge-solving disabled unless explicitly needed, confirm any payment or account-changing action, and verify the external PinchTab binary before installing.

Findings (7)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If enabled, the agent could help bypass bot-detection or challenge pages on websites, which may violate site rules or automate actions users did not intend.

Why it was flagged

The docs explicitly describe solving anti-bot challenges and using stealth mode. Although SKILL.md says this requires user approval, this is a high-risk browser automation capability that can bypass site protections.

Skill content
Try `POST /solve` first — it auto-detects Cloudflare Turnstile and solves it ... Verify `stealthLevel: "full"` is active
Recommendation

Keep challenge solving and stealth disabled unless the user explicitly confirms it is needed and authorized for the current site and task.

What this means

The agent may be able to view private account pages or perform account-changing actions in logged-in sessions.

Why it was flagged

The skill can reuse authenticated browser state and access cookies, which gives the agent authority to act as the logged-in user on visited sites.

Skill content
log into sites with a persistent profile ... Cookie data (`pinchtab cookies`) contains session credentials
Recommendation

Use dedicated low-privilege browser profiles, avoid personal profiles, and require explicit confirmation before purchases, deletions, account changes, or other sensitive actions.

What this means

If enabled, generated or untrusted JavaScript could read or change page state in the active browser session.

Why it was flagged

JavaScript execution in the page is a powerful capability, but the docs state it is disabled by default and requires explicit configuration.

Skill content
`pinchtab eval <expression>` Run JavaScript in the browser context ... Requires `security.allowEvaluate: true` in config. Returns 403 by default.
Recommendation

Leave evaluation disabled unless necessary, avoid the `--yolo` or guards-down preset, and review any JavaScript before running it.

What this means

Exported network logs could reveal private URLs, session tokens, or response contents if saved or shared carelessly.

Why it was flagged

Network exports can persist sensitive browsing data and tokens into files that may later be shared, reused, or exposed.

Skill content
Network exports (`pinchtab network-export`) may contain private URLs, auth tokens, and response bodies. Omit `--body` for sensitive sessions. Delete or redact export files after use.
Recommendation

Avoid exporting bodies for authenticated sessions, store exports only in safe temporary/workspace paths, and delete or redact them after use.

What this means

Browser state or page content could be exposed to another local agent, a shared server, or a remote PinchTab instance if targeting/authentication is not set carefully.

Why it was flagged

The tool can connect to protected or remote PinchTab servers and uses tokens/sessions to separate callers. Misconfiguration could send browser-control requests or page data to the wrong server.

Skill content
`PINCHTAB_TOKEN` | Authenticate CLI or MCP requests to a protected server ... `pinchtab --server http://192.168.1.50:9867 snap`
Recommendation

Prefer localhost or explicitly trusted servers, use `PINCHTAB_SESSION` or `PINCHTAB_TOKEN`, and avoid anonymous shared-tab workflows for sensitive browsing.

What this means

Installing the skill requires trusting the external PinchTab distribution channel.

Why it was flagged

The skill depends on an externally installed binary, and the submitted artifact set contains instructions and references rather than the binary source code.

Skill content
brew | formula: pinchtab/tap/pinchtab | creates binaries: pinchtab
Recommendation

Install from the official source, pin/verify the version when possible, and check release checksums or source provenance before use.

What this means

A running daemon may keep browser automation capability available after the immediate task ends.

Why it was flagged

The tool supports a background service. The docs present this as a user-directed management command, not hidden persistence.

Skill content
`pinchtab daemon` Manage the user-level background service ... `pinchtab daemon install` ... `pinchtab daemon start`
Recommendation

Only enable the daemon if needed, and stop or uninstall it when browser automation is no longer required.