tappi

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

tappi is a disclosed browser-control CLI, but it gives an agent broad control over your logged-in Chrome session, including uploads, JavaScript eval, and CAPTCHA/iframe coordinate clicks.

Use this only if you are comfortable letting an agent control a browser profile. Prefer a separate, non-personal Chrome profile; keep the CDP endpoint local; do not use it for CAPTCHA bypass; and require explicit confirmation before uploads, posts, purchases, account changes, or any action on sensitive logged-in sites.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill can act as you on websites where the controlled browser is already signed in, potentially changing account, business, or public-facing data.

Why it was flagged

The skill uses the browser's existing logged-in session authority rather than a narrowly scoped service token or per-site credential boundary.

Skill content
Requires a Chrome/Chromium browser running with --remote-debugging-port ... Signed-in sessions carry over automatically.
Recommendation

Use a separate browser profile or test account, keep the CDP port local, and require explicit approval before the agent performs account-changing actions.

What this means

A mistaken or overzealous agent action could submit forms, upload local files, click sensitive controls, or interact with CAPTCHA/iframe UI in your active browser session.

Why it was flagged

The documented commands provide raw browser actions that can bypass normal UI friction and operate on arbitrary sites, with no artifact-backed limits or approval policy.

Skill content
bjs upload <path> [selector] Upload file to input (bypasses OS dialog) ... Coordinate commands (cross-origin iframes, captchas, overlays)
Recommendation

Limit use to trusted, user-specified tasks; avoid using it for CAPTCHA/bot-protection interactions; and add confirmation requirements for uploads, submissions, purchases, posts, or account changes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

Bad or unreviewed JavaScript could read or modify page state and trigger actions inside a signed-in website.

Why it was flagged

The skill explicitly exposes arbitrary JavaScript execution in the active page context, which is powerful in logged-in pages even though it is documented as a last resort.

Skill content
bjs eval <js>               [Low-level] Run JavaScript. Last resort when smart actions can't solve the problem.
Recommendation

Prefer the higher-level click/type/text commands and only use `eval` when the exact JavaScript has been reviewed for the current page.

What this means

Installing dependencies changes the local environment and relies on npm package provenance.

Why it was flagged

The skill relies on an npm dependency for WebSocket CDP access; a package-lock with integrity is present, but the registry install metadata is sparse and the dependency range should be installed with the lockfile honored.

Skill content
"dependencies": { "ws": "^8.19.0" }
Recommendation

Install from the intended `scripts/` directory, prefer `npm ci` so the lockfile is used, and verify the package source before giving it access to logged-in browser sessions.