Web Research Assistant

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This is a web-search helper, but it explicitly promotes using BrowserAct to bypass paywalls, CAPTCHA/verification, and geo restrictions while not cleanly declaring the BrowserAct token it requires.

Review carefully before installing. If you use it, restrict it to public or authorized research, configure the BrowserAct token deliberately, avoid confidential queries unless BrowserAct is approved, and independently verify any generated report.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could be steered toward accessing or extracting content in ways that violate website controls, terms, or legal expectations.

Why it was flagged

The skill explicitly tells users to use it in paywall and human-verification scenarios, which can encourage bypassing website access controls rather than only researching public, authorized sources.

Skill content
“Paywalls prevent data extraction” and “内置绕过机制,无需处理 reCAPTCHA 或其他验证挑战。”
Recommendation

Use only for public or otherwise authorized research. The skill should remove paywall/CAPTCHA-bypass positioning and require explicit user confirmation before attempting restricted-source research.

What this means

Users may over-trust generated reports or assume extracted facts are verified when the code only performs lightweight snippet extraction and recommends later verification.

Why it was flagged

The documentation makes an absolute no-hallucination and precision guarantee for web extraction, which overstates reliability for search snippets and third-party web data.

Skill content
“没有幻觉,确保稳定精准提取数据”
Recommendation

Treat results as unverified research leads. The skill should replace absolute accuracy claims with clear limitations and validation requirements.

What this means

Users may be surprised by the required credential or may paste a secret into chat because the credential contract is inconsistent.

Why it was flagged

The executable requires a BrowserAct token, but registry metadata declares no required environment variables and SKILL.md asks for BROWSERACT_API_KEY instead.

Skill content
BROWSERACT_MCP_TOKEN = os.environ.get("BROWSERACT_MCP_TOKEN"); ... if not BROWSERACT_MCP_TOKEN: print("Error: BROWSERACT_MCP_TOKEN environment variable not set")
Recommendation

Declare the required credential in metadata, use one consistent environment variable name, and prefer setting it through a shell environment or secret manager rather than chat.

What this means

Research topics, and potentially sensitive query text, will be shared with BrowserAct.

Why it was flagged

The user’s query and search parameters are sent to the BrowserAct provider with a bearer token. This is expected for the integration, but it is an external data flow.

Skill content
MCP_SERVER_URL = "https://mcp.browseract.com/"; ... requests.post(MCP_SERVER_URL, headers={"Authorization": f"Bearer {BROWSERACT_MCP_TOKEN}"}, json=payload, timeout=60000)
Recommendation

Avoid sending confidential queries unless BrowserAct is approved for that data, and disclose this provider data flow clearly to users.