Stealth Browser
Analysis
This skill is built to evade website defenses, solve CAPTCHAs, and save reusable login sessions so an agent can silently act on websites later.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Use for any web automation requiring bot detection evasion, login persistence, headless browsing, or bypassing security measures.
The skill's core instructions are to evade bot-detection and bypass website security controls, not merely automate user-approved browsing.
优先使用 headless 模式静默尝试 ... 避免打扰用户操作
The execution strategy says to prioritize silent headless attempts and avoid disturbing the user, which supports hidden autonomous browser activity.
npm install -g puppeteer-extra puppeteer-extra-plugin-stealth ... pip install undetected-chromedriver DrissionPage ... docker run -d --name flaresolverr ... ghcr.io/flaresolverr/flaresolverr
The setup uses unpinned global packages and an unpinned Docker image for high-risk browser-evasion tooling, with no lockfile or provenance controls shown.
options.set_argument('--no-sandbox')The browser is launched with sandboxing disabled while navigating to arbitrary user-supplied websites, reducing local isolation against malicious pages.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
When user asks to "login to X website", automatically use headed mode for login, then save session for future headless reuse.
A simple login request is expanded into persistent session capture and later headless reuse, giving the agent ongoing delegated access to the user's authenticated account.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
self.data["cookies"] = page.cookies.as_dict() ... self.data["localStorage"] = json.loads(ls) if ls else {} ... self.save()The code stores cookies and localStorage from browser pages into persistent local session files for reuse, with no evident retention, encryption, or per-site containment.
requests.post("http://2captcha.com/in.php", data={"key": api_key, ... "pageurl": page_url, ...})The CAPTCHA solver sends the user's solver API key and target page URL to an external service over plaintext HTTP for 2Captcha.
