Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Browser Extension Enabler

Auto-detect and enable OpenClaw Browser Relay Chrome extension when disconnected. Uses native mouse control to click the extension icon.

MIT-0 · Free to use, modify, and redistribute. No attribution required.
0 · 250 · 0 current installs · 0 all-time installs
MIT-0
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The name and description (enable a browser extension by moving/clicking the mouse) align with the instructions to use a mouse-control skill (win-mouse-native) and a PowerShell helper. However the package as provided does not include the referenced scripts (SKILL.md and PUBLISH.md reference scripts/enable-browser-extension.ps1), and registry metadata presented earlier omitted required bins while _meta.json lists powershell — this mismatch is an incoherence that should be resolved before trusting the skill.
!
Instruction Scope
The runtime instructions tell the agent to run a local PowerShell script via exec (running powershell -File "$env:USERPROFILE\.openclaw\workspace\skills\browser-extension-enabler\scripts\enable-browser-extension.ps1"). That script is not present in the provided bundle, so we cannot verify what commands it executes. The SKILL.md also instructs direct mouse movement and clicks (via win-mouse-native), which will control the real mouse and may click arbitrary UI if coordinates or context are wrong. The instructions also allow autonomous agent invocation when a disconnected state is detected, increasing the risk if the script does more than indicated.
Install Mechanism
This is an instruction-only skill with no install spec (low surface area). PUBLISH.md and SKILL.md expect a scripts directory and an included PowerShell script, but that file is absent from the bundle. Because no code was present for the scanner to analyze, we cannot confirm the script’s behavior — this missing artifact is the primary install/packaging concern.
Credentials
The skill does not request secrets or external credentials and only references standard environment paths (e.g., $env:USERPROFILE) and the workspace location. That is proportionate for a local automation task. Still, the exec path runs a PowerShell file from the user's workspace; without the script content you cannot verify it won't read other files or exfiltrate data.
Persistence & Privilege
always is false (good) and the skill is user-invocable. Autonomous invocation is allowed (platform default). Combined with real-mouse control this increases the potential for unintended UI actions if the skill is invoked at the wrong time, but there is no evidence the skill requests elevated persistent privileges or modifies other skills.
Scan Findings in Context
[no-code-to-scan] unexpected: The regex scanner had no code files to analyze. SKILL.md and PUBLISH.md reference scripts that are missing from the package — because the actual script content is absent, there were no code-based findings to report; this absence itself is a concern.
What to consider before installing
This skill will move your real mouse and click things — do not install or run it blindly. Before installing or allowing autonomous runs: 1) verify the package actually contains scripts/enable-browser-extension.ps1 and inspect its full contents to confirm it only performs the described clicks and no other I/O or network activity; 2) confirm win-mouse-native is a known/trusted skill; 3) test in TestMode on a non-critical system and with Chrome visible, and calibrate coordinates carefully; 4) avoid running while doing important work (mouse control will interfere); 5) ask the publisher for the missing script if it is not present — the current bundle is incomplete, which is an installation/packaging red flag. If you cannot review the script, treat the skill as unsafe.

Like a lobster shell, security has layers — review code before you run it.

Current versionv1.0.0
Download zip
latestvk971x9yafntdfkg04kvfcf6mjd822cax

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

SKILL.md

Browser Extension Enabler

自动检测并启用 OpenClaw Browser Relay Chrome 扩展。当扩展未连接时,自动移动鼠标点击扩展图标。

功能

  • ✅ 自动检测 Browser Relay 连接状态
  • ✅ 鼠标自动移动到扩展图标位置
  • ✅ 自动点击启用扩展
  • ✅ 验证连接是否成功
  • ✅ 可配置的图标坐标

前置依赖

必须先安装 win-mouse-native skill:

clawhub install win-mouse-native

安装

clawhub install browser-extension-enabler

使用方法

命令行方式

# 使用默认坐标 (1920x1080 屏幕)
.\enable-browser-extension.ps1

# 指定自定义坐标
.\enable-browser-extension.ps1 -IconX 1800 -IconY 70

# 测试模式(不实际点击)
.\enable-browser-extension.ps1 -TestMode

在 Agent 中使用

当 Agent 检测到扩展未连接时,可以自动调用:

// 检测扩展状态
browser: { action: "tabs", profile: "chrome" }

// 如果未连接,自动启用
exec: {
  command: "powershell -File \"$env:USERPROFILE\\.openclaw\\workspace\\skills\\browser-extension-enabler\\scripts\\enable-browser-extension.ps1\"",
  pty: false
}

配置

校准扩展图标坐标

不同屏幕分辨率和浏览器配置下,扩展图标位置不同。请按以下步骤校准:

  1. 找到当前坐标

    # 把鼠标移到扩展图标上,记录位置
    win-mouse abs 1850 60
    
  2. 手动测试

    # 测试候选坐标
    win-mouse abs 1850 60   # 移动
    win-mouse click left    # 点击
    
  3. 更新默认值 编辑脚本中的 $IconX$IconY 默认值,或使用时传入参数

推荐坐标

屏幕分辨率图标坐标 (X, Y)
1920x1080(1850, 60)
2560x1440(2490, 70)
3840x2160(3770, 90)

工作流程

1. 检测 Browser Relay 连接状态
   ↓ 未连接
2. 激活 Chrome 窗口
   ↓
3. 移动鼠标到扩展图标
   ↓
4. 点击左键
   ↓
5. 等待 5 秒
   ↓
6. 验证连接成功 (最多重试3次)

测试方法

  1. 关闭 OpenClaw Browser Relay 扩展(点击扩展图标断开)
  2. 运行脚本:enable-browser-extension.ps1
  3. 观察鼠标移动和点击
  4. 验证扩展是否重新连接

故障排除

扩展仍未连接

  • 检查坐标是否正确:win-mouse abs X Y 测试
  • 确保 Chrome 窗口可见(未最小化)
  • 检查是否已安装 OpenClaw Browser Relay 扩展
  • 增加等待时间或重试次数

鼠标移动但无响应

  • 确保 Chrome 在操作时是前台窗口
  • 增加点击前的等待时间
  • 检查扩展图标是否被其他图标遮挡

检测失败但扩展已连接

脚本通过 openclaw browser tabs 命令检测。如果输出格式变化,可能需要更新匹配模式。

安全提示

⚠️ 此 skill 会控制真实鼠标移动和点击,请确保:

  • 了解脚本将点击的位置(先用 TestMode 验证)
  • 在测试模式下先验证坐标
  • 不要在重要工作时运行(可能干扰操作)

版本历史

  • v1.0.0 - 初始版本,支持基本的自动启用功能

许可证

MIT

作者

OpenClaw Community

Files

3 total
Select a file
Select a file to preview.

Comments

Loading comments…