Chrome Devtools Mcp 1.0.0

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a clearly described Chrome browser automation skill, but users should be aware it grants powerful browser control and runs an unpinned external MCP package.

This skill appears purpose-aligned and not malicious from the provided artifacts. Install it only if you are comfortable giving an agent browser-automation powers. For sensitive work, pin the npm package version, disable telemetry and CrUX calls, and use a separate test browser profile rather than your normal logged-in Chrome session.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could click buttons, fill and submit forms, inspect page/network data, or upload files in a browser session.

Why it was flagged

The skill intentionally exposes broad browser automation. This is central to its purpose, but it can affect real websites and accounts if used in sensitive sessions.

Skill content
gives AI agents full control of a live Chrome browser via Puppeteer ... click, fill forms, navigate, screenshot, performance traces, network inspection
Recommendation

Use it for testing or controlled browsing. Avoid using it on sensitive logged-in sessions unless you explicitly want the agent to act there.

What this means

JavaScript run in a page can read or change that page’s state and interact with the current browser context.

Why it was flagged

The MCP tool can execute JavaScript inside the browser page. This is expected for DevTools-style debugging, but it is a code-execution capability.

Skill content
`evaluate_script` | Run JavaScript in page
Recommendation

Only run page scripts on sites and sessions where that behavior is intended.

What this means

Future npm package changes could alter the behavior of the MCP server without this skill package changing.

Why it was flagged

The setup path downloads/runs the latest npm package rather than a pinned version. This is disclosed and purpose-aligned, but the exact code executed may change over time.

Skill content
run("npx -y chrome-devtools-mcp@latest --help", timeout=60)
Recommendation

Prefer pinning a known package version for repeatable environments, and review the upstream package source when using it in sensitive workflows.

What this means

The agent could act with whatever browser session, cookies, or account state is present in that Chrome instance.

Why it was flagged

Connecting to an existing Chrome instance may give the agent access to active tabs and logged-in sessions if the user starts Chrome that way.

Skill content
Connect to existing Chrome (must be started with --remote-debugging-port=9222)
Recommendation

Use headless mode or a separate test Chrome profile instead of connecting to your personal logged-in browser.

What this means

Some usage or performance-related information may be sent to Google unless disabled.

Why it was flagged

The artifacts disclose external data flows to Google services and provide flags to disable them.

Skill content
Google collects usage statistics by default — disable with `--no-usage-statistics`; Performance tools may send trace URLs to Google CrUX API — disable with `--no-performance-crux`
Recommendation

Use `--no-usage-statistics --no-performance-crux` for private or sensitive testing.