Stagehand Browser CLI

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running setup could modify the user's Node/global command environment or cause the agent to invoke an unreviewed browser command.

Why it was flagged

These setup steps install and globally link a CLI, but the submitted skill has no reviewed source/package files or install spec for that command.

Skill content
"Run: npm install (this will automatically build TypeScript)", "Run: npm link (this creates the global 'browser' command)"
Recommendation

Do not run the setup until the full source, package manifest, dependency lockfile, and install spec are supplied and trusted.

What this means

Browsing activity may run through a remote Browserbase account and consume or expose account-backed browser sessions without an explicit per-task mode choice.

Why it was flagged

The skill can detect Browserbase credentials in a .env file and choose the remote browser account automatically, while the registry metadata declares no credentials or environment variables.

Skill content
"If Browserbase API keys exist ... Uses remote Browserbase environment" ... "No user prompting"
Recommendation

Require explicit user confirmation before remote mode, declare the Browserbase credentials in metadata, and remove those keys when local-only browsing is intended.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

Users could run automations that get accounts flagged, violate site rules, or perform scraping they did not intend to route through a remote anti-detection environment.

Why it was flagged

The remote mode is positioned for stealth/proxy/CAPTCHA-supported scraping, which is broader than ordinary browser assistance and may bypass site controls.

Skill content
"Stealth mode | No | Yes" ... "Proxy/CAPTCHA | No | Yes" ... "Best for | Development | Production/scraping"
Recommendation

Use only on sites where automation is authorized, avoid stealth/CAPTCHA/proxy features unless explicitly needed, and confirm before scraping or submitting forms.

What this means

A vague action could click, type, or submit something unintended on a real website.

Why it was flagged

AI-selected browser actions are central to the skill and disclosed, but the documentation acknowledges ambiguous instructions can act on the wrong page element.

Skill content
"Supports: clicking, typing, selecting, scrolling, waiting, hovering" and "Without specificity it might succeed on the wrong element!"
Recommendation

Use observe and screenshots before sensitive actions, and require explicit confirmation for login, purchase, deletion, posting, or form-submission steps.

What this means

If the user logs into a site, later runs may still be authenticated and able to act in that account.

Why it was flagged

The skill uses a persistent browser profile, so authenticated sessions can remain available to later browser automation.

Skill content
"This example uses Chrome's user profile (`.chrome-profile/`) which may preserve session cookies between runs."
Recommendation

Use a dedicated profile for this skill, log out of sensitive sites, and delete .chrome-profile when session persistence is not desired.

What this means

Screenshots, downloads, or cached page analysis from sensitive sites may remain on disk and be reused or viewed later.

Why it was flagged

The skill writes browsing artifacts and enables caching, which may retain private page content or downloaded files after the task.

Skill content
"Screenshots: `./agent/browser_screenshots/`", "Downloads: `./agent/downloads/`", and "enableCaching: true"
Recommendation

Regularly clear the screenshot, download, cache, and profile directories, especially after working with private or authenticated pages.