Install
openclaw skills install win11-visible-browserControl, diagnose, or repair a visible Windows 11 Edge/Chrome browser from OpenClaw running in WSL2 via CDP. Use when browser automation should share the user's real visible browser session, existing tabs, cookies, logins, and state; when login, captcha, 2FA, approvals, or manual takeover require a human-in-the-loop; or when WSL2/OpenClaw browser control needs CDP, firewall, portproxy, attachOnly profile, or Windows browser troubleshooting.
openclaw skills install win11-visible-browserUse this skill when OpenClaw runs in WSL2/Linux but should work in a visible Windows 11 Edge/Chrome browser that the human can watch, use, and take over.
This is for legitimate assisted browsing in a normal visible browser session. Do not use it to bypass site protections, automate prohibited activity, or hide automation from the user.
Before state-changing actions, state what/where/risk/rollback and wait for explicit confirmation. State-changing actions include editing OpenClaw config, creating Scheduled Tasks, changing Windows firewall/portproxy, starting/stopping browser processes, writing scripts outside the workspace, sending forms/messages, purchases, or account actions.
Prefer visible browser automation when the task benefits from:
web_fetch or a fresh/headless browser.Use safe wording: this skill gives the agent access to a normal visible browser while keeping the human in the loop. It does not try to bypass anti-bot systems.
Use a dedicated Windows browser profile by default. Use the user's personal browser profile only when the user explicitly wants existing personal cookies/logins/tabs.
OpenClaw Gateway in WSL2
→ OpenClaw browser profile (example: win-edge)
→ http://WINDOWS_WSL_GATEWAY_IP:9223
→ Windows portproxy/firewall relay
→ 127.0.0.1:9222
→ visible Windows 11 Edge/Chrome profile
Recommended defaults:
win-edge or win-chrome92229223C:\ProgramData\OpenClaw\browser-profileOpenClaw-Start-Windows-Browser-CDPFor implementation details, read {baseDir}/references/setup.md.
Run read-only checks before repair:
openclaw browser profiles
openclaw browser --browser-profile win-edge doctor
WIN_IP=$(ip route | awk '/default/ {print $3; exit}')
curl -sS --max-time 5 "http://$WIN_IP:9223/json/version"
Or use the bundled helper:
{baseDir}/scripts/check-win11-visible-browser.sh win-edge
If CDP works, smoke-test real browser control:
openclaw browser --browser-profile win-edge open https://example.com
openclaw browser --browser-profile win-edge snapshot --format aria
Repair in layers and stop when the layer works:
127.0.0.1:9222.0.0.0.0:9223 → 127.0.0.1:9222.cdpUrl pointing to the WSL-visible Windows endpoint and attachOnly: true.The bundled Windows repair script is {baseDir}/scripts/start-win11-browser-cdp-for-openclaw.ps1. Treat it as a template: review paths, profile name, browser path, ports, and firewall rule names before installing or running it.
No supported browser found: WSL cannot launch Windows Edge/Chrome as a local Linux browser; use remote CDP.browser.profiles.<name>.cdpUrl or rerun the documented repair flow.When done, report:
openclaw browser --browser-profile <profile> doctor result;/json/version result from WSL;