Web + Desktop Automation
Analysis
This is a transparent browser and desktop automation toolkit, but it can operate logged-in websites and local apps, so users should confirm sensitive actions.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Filling forms, clicking buttons, logging in - Downloading or uploading files - Controlling desktop apps with mouse/keyboard
These capabilities are central to the stated automation purpose, but they allow high-impact interactions with websites, accounts, files, and local applications if used carelessly.
pip install playwright pyautogui opencv-python pillow playwright install
The skill relies on external Python packages and Playwright browser binaries. This is disclosed and purpose-aligned, but dependency installation is not captured in an install spec.
Download a CSV report from a website, open it in a local spreadsheet app, make a small edit, save it, then upload the result back to the website.
The example intentionally chains web download, local desktop editing, and web upload. The documented safeguards reduce risk, but mistakes could propagate from a local edit back into an online system.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
- Login flows ... - Reuse authenticated sessions when allowed
The skill contemplates operating within logged-in web sessions. That is expected for browser automation, but it means actions may be taken under the user's account authority.
