Edge Browser
Security checks across static analysis, malware telemetry, and agentic risk
Overview
This skill is a straightforward Edge/Chromium page-fetching helper, with only expected browser automation and setup risks to notice.
This appears safe for its stated purpose. Before installing, expect to set up Playwright/Chromium, use it only on URLs you intentionally want fetched, and remember that the optional --output path writes the extracted page data to the file you choose.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
65/65 vendors flagged this skill as clean.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If invoked on the wrong URL, the agent may visit and return content from a page the user did not intend to fetch.
The helper accepts a user-provided URL, loads it in a browser, and extracts full HTML and body text. This is exactly the skill's purpose, but it is still broad browser automation that should remain user-directed.
parser.add_argument("url", help="URL to fetch") ... page.goto(url, wait_until="networkidle") ... "content": page.content(), "text": page.inner_text("body")Use the skill only for specific URLs you want the agent to open, and be cautious with private, local, or internal URLs.
Installing the skill may require downloading and installing Playwright and a browser runtime that are not pinned in the skill metadata.
The setup instructions install an unpinned Python package and browser runtime, and the registry has no install spec or declared required binaries. This is expected for a Playwright-based browser helper, but users should recognize the external dependency install.
pip install playwright playwright install chromium
Install dependencies from trusted package sources, consider pinning versions in your environment, and confirm the Playwright/Chromium download is acceptable before use.
