Fox Camoufox
Analysis
This skill does what it says, but it is a stealth browser that can reuse logged-in sessions on protected sites, so it should be reviewed carefully before use.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Anti-detect browser automation ... bot-detection-heavy sites like X/Twitter, Naver ... stealth browsing with OS/browser fingerprint spoofing, humanized mouse movements, and persistent sessions.
The skill is explicitly designed to evade bot-detection controls and automate protected sites, and it does not define limits or approval gates for what the agent may do once browsing.
pip install --upgrade pip pip install camoufox ... sudo apt install -y xvfb || true
The user-directed setup installs an unpinned Python package and may install OS packages with sudo, which is purpose-aligned but should be reviewed before running.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Session will be saved to profile for future automated use.
Manual logins are stored as reusable browser sessions, giving future automation delegated access to the user's logged-in accounts.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
persistent_context=True,
user_data_dir='~/.openclaw/camoufox-profile'The browser profile persists cookies, site state, and potentially sensitive authenticated browsing context across tasks, with no retention or cleanup guidance.
