Fast Browser Use 1.0.5
Analysis
This is a powerful browser automation skill that openly includes bot-detection bypass, session-cookie saving and reuse, and sandbox-disabled browsing, so it should be reviewed carefully before installing.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
### 1. Bypass "Bot Detection" via Human Emulation Simulate mouse jitter and random delays to scrape protected sites.
The skill explicitly instructs agents to evade bot-detection controls and scrape protected sites, which is broader and riskier than neutral browser automation.
let options = LaunchOptions::default().sandbox(false);
Several CLI workflows launch Chrome with the sandbox disabled while navigating to user-supplied web pages.
### 3. Login & Cookie Heist Log in manually once, then steal the session for headless automation.
The documentation frames credential/session capture as a 'heist' and 'steal the session', encouraging unsafe handling of authenticated sessions.
Source: unknown ... Install specifications No install spec — this is an instruction-only skill.
The registry metadata under-declares setup even though SKILL.md lists brew/cargo installation, Chrome, and CHROME_PATH requirements.
var loadReadability = new Function(
The static scan reports dynamic JavaScript construction for markdown/readability conversion; this appears related to the stated browser-content extraction purpose but should still be reviewed.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
let cookies = session.get_cookies()?; let json = serde_json::to_string_pretty(&session_data)?; fs::write(&save_session, json)?;
The login flow saves authenticated browser cookies to a user-specified JSON file for later reuse.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
let bind_addr = format!("127.0.0.1:{}", cli.port); ... StreamableHttpService::new(...)The MCP server can expose browser-control tools over local SSE/HTTP transports bound to localhost.
