Stagehand Browser CLI

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: Developer: Version: Description: OpenClaw Agent Skill The skill is classified as suspicious due to several high-risk capabilities, even without clear evidence of intentional malicious behavior within the provided files. The `SKILL.md` explicitly allows `Bash` execution, granting the AI agent broad command execution capabilities. The `REFERENCE.md` reveals that the browser uses a persistent profile (`.chrome-profile/`) which stores sensitive data like cookies and potentially saved passwords, and it allows unrestricted file downloads to a known path (`./agent/downloads/`). These features, combined with the natural language interface for browser automation, make the skill highly susceptible to prompt injection from a user to perform unauthorized actions, data exfiltration, or download and potentially execute malicious payloads.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running setup could modify the user's Node/global command environment or cause the agent to invoke an unreviewed browser command.

Why it was flagged

These setup steps install and globally link a CLI, but the submitted skill has no reviewed source/package files or install spec for that command.

Skill content
"Run: npm install (this will automatically build TypeScript)", "Run: npm link (this creates the global 'browser' command)"
Recommendation

Do not run the setup until the full source, package manifest, dependency lockfile, and install spec are supplied and trusted.

What this means

Browsing activity may run through a remote Browserbase account and consume or expose account-backed browser sessions without an explicit per-task mode choice.

Why it was flagged

The skill can detect Browserbase credentials in a .env file and choose the remote browser account automatically, while the registry metadata declares no credentials or environment variables.

Skill content
"If Browserbase API keys exist ... Uses remote Browserbase environment" ... "No user prompting"
Recommendation

Require explicit user confirmation before remote mode, declare the Browserbase credentials in metadata, and remove those keys when local-only browsing is intended.

ConcernMedium Confidence
ASI02: Tool Misuse and Exploitation
What this means

Users could run automations that get accounts flagged, violate site rules, or perform scraping they did not intend to route through a remote anti-detection environment.

Why it was flagged

The remote mode is positioned for stealth/proxy/CAPTCHA-supported scraping, which is broader than ordinary browser assistance and may bypass site controls.

Skill content
"Stealth mode | No | Yes" ... "Proxy/CAPTCHA | No | Yes" ... "Best for | Development | Production/scraping"
Recommendation

Use only on sites where automation is authorized, avoid stealth/CAPTCHA/proxy features unless explicitly needed, and confirm before scraping or submitting forms.

What this means

A vague action could click, type, or submit something unintended on a real website.

Why it was flagged

AI-selected browser actions are central to the skill and disclosed, but the documentation acknowledges ambiguous instructions can act on the wrong page element.

Skill content
"Supports: clicking, typing, selecting, scrolling, waiting, hovering" and "Without specificity it might succeed on the wrong element!"
Recommendation

Use observe and screenshots before sensitive actions, and require explicit confirmation for login, purchase, deletion, posting, or form-submission steps.

What this means

If the user logs into a site, later runs may still be authenticated and able to act in that account.

Why it was flagged

The skill uses a persistent browser profile, so authenticated sessions can remain available to later browser automation.

Skill content
"This example uses Chrome's user profile (`.chrome-profile/`) which may preserve session cookies between runs."
Recommendation

Use a dedicated profile for this skill, log out of sensitive sites, and delete .chrome-profile when session persistence is not desired.

What this means

Screenshots, downloads, or cached page analysis from sensitive sites may remain on disk and be reused or viewed later.

Why it was flagged

The skill writes browsing artifacts and enables caching, which may retain private page content or downloaded files after the task.

Skill content
"Screenshots: `./agent/browser_screenshots/`", "Downloads: `./agent/downloads/`", and "enableCaching: true"
Recommendation

Regularly clear the screenshot, download, cache, and profile directories, especially after working with private or authenticated pages.