Silmaril Ranger

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a plausible browser-automation skill, but it relies on running an unreviewed external toolkit with powerful browser, JavaScript, and proxy capabilities.

Review or pin the external Silmaril toolkit before installing it, and use the skill only for scoped browser tasks. Avoid sensitive accounts unless necessary, and require explicit confirmation before the agent runs JavaScript, submits forms, changes account data, or enables MITM proxying.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing or using the skill may run external code that was not included in the reviewed artifact set, and that code can control the browser and proxy workflow.

Why it was flagged

The skill has no reviewed code or install spec, yet its setup path depends on cloning an unpinned external repository and running a wrapper that bypasses PowerShell execution policy.

Skill content
`git clone https://github.com/Malac12/CDP-tools.git "D:\\silmairl cdp"` ... `silmaril.cmd` invokes PowerShell with `ExecutionPolicy Bypass`.
Recommendation

Only install from a trusted, pinned commit or reviewed local checkout, and inspect the toolkit before allowing the agent to run it.

What this means

The agent could click, type, modify page content, or run JavaScript in browser pages in ways that affect logged-in websites or user workflows.

Why it was flagged

The skill directs the agent to use affirmative flags for mutating browser actions, including JavaScript execution, without clearly bounding which sites or actions require explicit user confirmation.

Skill content
Pass `--yes` for page actions and mutations such as `click`, `type`, `set-text`, `set-html`, and `eval-js`.
Recommendation

Use this only for clearly scoped tasks, and require explicit approval before actions that submit forms, change account data, purchase items, publish content, or run JavaScript on sensitive sites.

What this means

Proxy-backed browsing can expose or alter web traffic during the task, especially if used on sensitive sites.

Why it was flagged

The proxy workflow can intercept or override browser traffic; the documentation does disclose this and recommends local-only binding.

Skill content
Expect HTTPS interception to require a trusted mitmproxy certificate. ... Keep `--listen-host` on loopback unless the user explicitly requests `--allow-nonlocal-bind`.
Recommendation

Keep proxy use limited to local testing, avoid sensitive accounts while interception is enabled, and do not allow non-local binding unless you understand the exposure.

What this means

Information from pages the agent visits may remain on disk after the automation run.

Why it was flagged

Flow execution may persist page-derived data locally as artifacts, which is disclosed but could include sensitive page content depending on the site.

Skill content
`run` writes per-step JSON, a summary, a log, and usually a final DOM snapshot into an artifacts directory.
Recommendation

Choose an artifacts directory deliberately and delete outputs that contain private or sensitive page data.