Browserless Agent
Analysis
This appears to be a legitimate browser automation skill, but it gives the agent broad control over websites and may expose sensitive form input in logs despite privacy claims.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Professional web automation ... interact with any website ... Form Automation ... upload files ... Network Control ... Storage Access
The skill intentionally exposes broad browser actions across arbitrary websites, including inputs, uploads, storage, and network controls. The artifacts do not describe scoping or confirmation requirements for high-impact website mutations.
`evaluate` / `evaluate_function` - Run JavaScript
Running JavaScript in the page is a disclosed feature and is purpose-aligned for browser automation, but it is a powerful escape-hatch capability that can affect the current web page and session.
print(f"Typing '{text}' into selector: {selector}", file=sys.stderr) ... return {"status": "success", "action": "type_text", "selector": selector, "text": text}The code logs and returns the full text typed into a page. This conflicts with the documentation's broad security claim that credentials are never logged, because typed form values may include passwords, tokens, or other secrets.
playwright
The dependency is not version-pinned. Installing an unpinned package is common for simple Python projects, but it means future installs may resolve to different package versions.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
BROWSERLESS_TOKEN = os.environ.get("BROWSERLESS_TOKEN") ... url = f"{url}{separator}token={BROWSERLESS_TOKEN}"The skill uses an optional Browserless authentication token and appends it to the WebSocket connection URL. This is expected for Browserless, but it is delegated service access that users should treat as a credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Cloud Service (with token): BROWSERLESS_URL=wss://chrome.browserless.io ... Get your Browserless service at browserless.io
The skill connects to an external Browserless provider when configured that way. Browser actions, page content, screenshots, and form interactions may be processed by that provider.
Storage & Cookies ... `get_cookies` / `set_cookie` / `delete_cookies` ... `get_local_storage` / `set_local_storage` / `clear_local_storage`
Cookie and web-storage access is disclosed and useful for automation, but it can expose or alter session-related browser state during multi-step tasks.
