Browser Read

v1.0.0

Extract readable content from browser pages as markdown. Use when web_fetch fails (bot protection, auth-required pages, Twitter/X, LinkedIn) and you already...

0· 236·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for bill492/browser-read.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Browser Read" (bill492/browser-read) from ClawHub.
Skill page: https://clawhub.ai/bill492/browser-read
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install browser-read

ClawHub CLI

Package manager switcher

npx clawhub@latest install browser-read
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description (extract readable content from an open browser page) match the included JS and SKILL.md. No unrelated binaries or credentials are requested.
Instruction Scope
Instructions tell the agent to read the extractor from ~/clawd/skills/browser-read/extract.js and run it in the browser via browser act evaluate. Reading the skill's own file and executing it in the page context is expected for this purpose; verify the runtime will only read the skill path (not arbitrary host files) and that browser evaluate is appropriately sandboxed.
Install Mechanism
No install spec — instruction-only with one included JS file. Nothing is downloaded from external URLs and no archives are extracted.
Credentials
No environment variables, credentials, or config paths are required. The extract script only reads DOM content, metadata, and document.location (expected for content extraction).
Persistence & Privilege
Skill is not always-enabled and is user-invocable. It does not request elevated persistence or modify other skills or system-wide settings.
Assessment
This skill appears coherent and low-risk: it runs a JS extractor inside the browser page and returns markdown, and it does not request secrets or make network calls. Before installing, confirm that (1) the agent's file-access is limited to the skill directory (the SKILL.md references ~/clawd/skills/browser-read/extract.js), (2) you are comfortable allowing the agent to evaluate scripts in pages you open (the script can read page content, metadata, and URLs), and (3) you avoid running it on highly sensitive pages (banking, 2FA flows) or pages where extracting content violates terms. If you want extra assurance, review extract.js yourself and test it on a non-sensitive page first.

Like a lobster shell, security has layers — review code before you run it.

latestvk974n645yacq0nj0ywcnvm8dtx835177
236downloads
0stars
1versions
Updated 1mo ago
v1.0.0
MIT-0

browser-read

Extract readable text from an already-open browser page and return markdown, suitable for pages where web_fetch is blocked or missing auth context.

When to use

  • web_fetch returned an error or empty content.
  • Page requires authentication/cookies/session state available only in the browser.
  • You need text extraction from Twitter/X or LinkedIn timelines/articles where screenshot/OCR was previously used.

When NOT to use

  • web_fetch already returns good markdown/text (faster and cheaper).
  • Purely static pages where normal fetch is sufficient.

Steps

  1. Navigate to the URL with browser navigate.
  2. Read extraction script from ~/clawd/skills/browser-read/extract.js.
  3. Run browser act with kind=evaluate and pass the script contents as fn.
  4. Script returns {title, content, excerpt, byline, siteName, length} where content is markdown.
  5. If extraction fails or returns empty content, script falls back to document.body.innerText.

Example (tool calls)

{
  "action": "navigate",
  "targetId": "...", 
  "url": "https://example.com"
}
{
  "action": "act",
  "targetId": "...",
  "kind": "evaluate",
  "fn": "(() => { ... return {title, content, excerpt, byline, siteName, length}; })()"
}

Notes

  • extract.js is a self-contained IIFE so it can be passed directly as the fn value to browser act.
  • Keep in mind this is a lightweight extractor; it intentionally strips script/style/nav/header/footer/aside/cookie/ad elements before conversion.

Comments

Loading comments...