stealthy-auto-browse

PassAudited by VirusTotal on May 10, 2026.

Overview

Type: OpenClaw Skill Name: stealthy-auto-browse Version: 2.0.0 The skill provides high-risk browser automation capabilities specifically designed to bypass security controls like Cloudflare and DataDome using stealth techniques (Camoufox, PyAutoGUI for OS-level input). It includes actions for extracting sensitive data such as cookies and local storage, as well as an 'eval' action for arbitrary JavaScript execution (SKILL.md). While these features align with the stated purpose of stealthy scraping, they represent a significant attack surface for automated abuse or session theft. The inclusion of a cluster mode with Redis-based cookie synchronization (references/setup.md) and a parallel search orchestrator (scripts/websearch.py) further increases the potential for large-scale automated misuse.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could be used to interact with protected websites in ways those sites are actively trying to block, potentially violating site rules or triggering account and legal consequences.

Why it was flagged

The skill is not merely automating a browser; it explicitly advertises evading bot-detection and CAPTCHA-related controls using stealth inputs and persistent fingerprints.

Skill content
Browser automation that passes CreepJS, BrowserScan, Pixelscan, and Cloudflare — zero CDP exposure, OS-level input, persistent fingerprints. Use when standard browser skills get 403s or CAPTCHAs.
Recommendation

Do not use this skill for general browsing or against third-party services with anti-bot protections; restrict use to authorized testing environments only.

What this means

Users may be led to believe the automation is safe for account activity even when it is designed to bypass platform defenses and could get accounts suspended.

Why it was flagged

The wording encourages users to trust the tool for ban evasion on logged-in accounts, which is a high-risk and potentially deceptive framing.

Skill content
You need a logged-in session that won't get banned
Recommendation

Avoid claims or workflows centered on avoiding bans or bypassing protections; require explicit authorization and warn users about account and policy risks.

What this means

If used with real accounts, the container can retain account sessions and continue to act with those account privileges in later runs.

Why it was flagged

The setup supports retaining authenticated cookies, sessions, and browser fingerprints across restarts, enabling durable access to logged-in accounts.

Skill content
Persistent profile (cookies, sessions, fingerprint survive restarts)
Recommendation

Use isolated test accounts only, avoid mounting persistent profiles unless absolutely necessary, and delete profile data after authorized testing.

What this means

Anyone who can reach the exposed ports may be able to view or control the browser, including any logged-in sessions or sensitive page contents.

Why it was flagged

The documented defaults bind the browser-control API and VNC viewer broadly while authentication is optional, creating unclear access boundaries for a service that may expose browser contents and sessions.

Skill content
`HTTP_LISTEN_HOST` | `0.0.0.0` ... `VNC_LISTEN_HOST` | `0.0.0.0` ... `AUTH_TOKEN` | — | If set
Recommendation

Bind services to localhost, always set a strong AUTH_TOKEN, avoid query-string tokens, firewall the ports, and do not expose the VNC viewer to untrusted networks.

What this means

The code actually run by the container may differ from the reviewed artifacts, and future image or compose changes could introduce new behavior.

Why it was flagged

The setup runs an external Docker image without a pinned digest; the optional cluster setup also downloads a compose file from a moving GitHub main branch.

Skill content
docker run -d --name browser ... psyb0t/stealthy-auto-browse
Recommendation

Pin Docker images by digest, review the container source and compose file before running, and avoid downloading executable deployment files directly from a moving branch.