Virtual Desktop Browser

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill appears to do what it says, but it gives an agent broad human-like control over Chromium and may use existing browser sessions unless isolated.

Review before installing. Run it in a container or dedicated empty Chromium profile, avoid using it with logged-in personal accounts unless intended, require confirmation for account-changing actions, and remember to stop the browser after use.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could operate websites as if it were a person; on logged-in accounts this could submit posts, messages, purchases, settings changes, or other actions, and may violate site rules.

Why it was flagged

The skill is explicitly designed to automate browser interactions in a human-like way on bot-resistant sites, and exposes click/type/hotkey/screenshot capabilities without documented action or site guardrails.

Skill content
automate with human-like mouse/keyboard/screenshot operations. Use for bot-resistant sites like Xiaohongshu and X/Twitter where GUI simulation is required.
Recommendation

Use only with explicit per-site and per-task approval. Add domain allowlists and require confirmation before login, posting, purchasing, deleting, messaging, or other account-impacting actions.

What this means

If Chromium is already logged in to services, the agent may act through the user's existing identity without the skill clearly disclosing or bounding that behavior.

Why it was flagged

The Chromium launch command shown does not use a dedicated --user-data-dir, incognito mode, or other profile isolation. On hosts where Chromium uses the current user's default profile, the agent may inherit cookies or signed-in sessions.

Skill content
chrome_cmd = ["chromium-browser", "--no-sandbox", "--disable-dev-shm-usage", "--disable-gpu", f"--window-size={FIXED_WIDTH},{FIXED_HEIGHT}"]; chrome_cmd.append(url or "about:blank")
Recommendation

Launch Chromium with an isolated empty profile by default, document any use of existing profiles, and require explicit opt-in before using real browser sessions or accounts.

What this means

Users must ensure they install the expected packages from trusted repositories and understand that the registry metadata may not fully prepare the environment.

Why it was flagged

The required setup is disclosed and purpose-aligned, but it depends on manual system package installation and Python dependencies rather than a complete install specification.

Skill content
apt-get install -y xvfb chromium-browser ... pip install -r requirements.txt
Recommendation

Install in a controlled virtual environment or container, pin dependency versions where possible, and declare required binaries in metadata.

What this means

The browser may remain open, consume resources, and keep web sessions active if browser_stop is not called.

Why it was flagged

The skill intentionally keeps Xvfb and Chromium running across multiple operations until explicitly stopped. This is disclosed, not hidden, but it is persistent runtime behavior.

Skill content
Browser lifecycle is manual: start once, multi-step flow, then stop.
Recommendation

Call browser_stop after each task, and consider adding automatic timeouts or cleanup on failures.