Chrome Devtools

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could interact with websites while authenticated in the persistent browser profile, which may affect accounts or expose session-backed page and network data.

Why it was flagged

A persistent browser profile can carry cookies, sessions, and account state. The artifacts do not clearly bound which profile is used, which sites/accounts may be automated, or when user approval is required.

Skill content
Browser starts automatically on first tool call using a persistent Chrome profile.
Recommendation

Use a dedicated low-privilege Chrome profile for this skill, avoid logging into sensitive accounts unless needed, and require explicit user approval before form submission, purchases, account changes, or other impactful actions.

What this means

A future package update or supply-chain issue could change what code runs on the user's machine when the MCP server starts.

Why it was flagged

The skill runs an npm package via npx using @latest and automatic yes mode. That means the code executed can change over time and is not pinned to a reviewed version.

Skill content
"command": "npx", "args": ["-y", "chrome-devtools-mcp@latest", ...]
Recommendation

Pin the MCP package to a specific reviewed version, document the package source/provenance, and avoid automatic latest-version execution where possible.

What this means

Browsing untrusted pages through this skill could be riskier than normal Chrome browsing because an important isolation layer is disabled.

Why it was flagged

The skill launches Chrome with sandbox protections disabled by default, increasing the impact if a malicious or compromised page exploits the browser.

Skill content
"--chrome-arg=--no-sandbox", "--chrome-arg=--disable-setuid-sandbox"
Recommendation

Avoid disabling the Chrome sandbox by default. If no-sandbox mode is required for a specific container environment, document that tradeoff clearly and make it opt-in.