Back to skill
Skillv1.0.0

ClawScan security

AI-Search-Hub · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 15, 2026, 1:30 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill appears to implement the advertised browser-automation features, but it accesses and copies local browser user-data (potentially exposing session cookies/tokens), omits declared dependency/permission metadata, and contains a static-scan flag (base64 block) — review and run in a sandbox before use.
Guidance
What to consider before installing/running this skill: - This skill will try to reuse your logged-in browser sessions by reading and copying local browser profile directories (Chrome/Brave/Edge/Arc/etc.). Those profiles can contain cookies, local storage, OAuth tokens, and other sensitive session material — review the code and be comfortable with that level of access before running. - The registry metadata does not declare required dependencies (Playwright, a Chromium-family browser) or config paths. You should ensure Playwright and browsers are installed from trusted sources and understand the commands the scripts will run. - The wrapper can either start a new debug browser (after copying a profile) or attach to an existing DevTools endpoint (e.g., http://127.0.0.1:9222). Attaching to an already-running browser gives the script direct control over that browser; avoid pointing it at your primary browser unless you explicitly want that. - A static scan flagged a base64-block. Inspect the repository for any embedded/obfuscated data (search for long base64 strings) and verify their purpose. If you find any non-obvious encoded payloads, treat them as suspicious until decoded and explained. - Recommended precautions: run the skill inside a disposable/sandbox environment or VM; run with an explicitly created test browser profile (use --user-data-source set to a safe test directory, or avoid seeding from your real profile); review and, if needed, modify the copy logic to exclude sensitive files; and inspect network activity while running (e.g., ensure it only contacts the intended target sites and localhost DevTools endpoints). - If you want to proceed but lack the security expertise, ask the maintainer for a minimal manifest that lists dependencies and an explicit explanation of exactly which user-data files are copied. If the skill's owner cannot justify the base64 entry or the missing dependency metadata, avoid running it on sensitive hosts.
Findings
[base64-block] unexpected: Static scan found a base64-block pattern in SKILL.md or other files. The visible files mostly contain readable Python and Markdown; a base64 block is not expected for straightforward browser automation. This could be an obfuscated payload or a false positive (e.g., an embedded data URI in README badges). Recommend searching the repo for base64 strings and verifying their purpose before running.

Review Dimensions

Purpose & Capability
noteThe name/description (browser automation for multiple chat/search sites) matches the included Playwright scripts and the wrapper. Accessing browser binaries, DevTools (CDP), and copying a browser profile is coherent with the stated goal of reusing logged-in sessions. However, the skill does not declare required binaries or config paths (no Playwright or Chromium binary listed, no config paths declared) even though the code expects Playwright and local browser user-data directories — an omission that reduces transparency.
Instruction Scope
concernSKILL.md explicitly instructs the agent to 'seed an isolated debug profile from the user's local browser data', attach to CDP on 127.0.0.1:9222, detect and wait for manual login, and then continue. The included scripts implement logic to discover guessed user-data directories, copy user profile data into a debug profile, and attach/start Chromium with a remote-debugging port. That means the runtime will read large parts of the user's browser profile (cookies, Local State, etc.) — a scope that goes beyond simple HTTP automation and can expose many session tokens.
Install Mechanism
noteThere is no install spec (instruction-only at registry level) but repository contains executable Python scripts that depend on Playwright and a Chromium-family binary. The skill does not declare these dependencies in metadata; the environment must already have Playwright and browsers installed. This mismatch is a transparency/usability issue (and a potential security hazard if users attempt to satisfy implicit install steps from untrusted sources).
Credentials
concernThe registry lists no required environment variables or config paths, yet the code reads and copies local browser user-data directories (home-based Chrome/Brave/Edge profiles). Those directories often contain sensitive tokens, cookies, and other state. While this access is functionally justified to reuse logged-in sessions, it is broad and potentially exposes credentials across many sites. No explicit credential scoping or warning is present in metadata.
Persistence & Privilege
noteThe skill does not request always:true and does not appear to modify other skills or system-wide agent settings. It will create an isolated debug profile and write logs/output under the repo (e.g., chrome_startup.log, out/*, debug profile dir). It can also be directed to attach to an existing CDP endpoint — which, if you point it at a running browser's DevTools, grants the script control over that browser session. This is powerful but explained in SKILL.md; combine with the user-data access it increases blast radius.