Camofox Browser Main

v1.0.0

Use the main local camofox-browser service for standard browser automation in this workspace. Trigger this when Lotfi asks for the main/local camofox browser...

0· 45·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for lotfinity/camofox-browser-main.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Camofox Browser Main" (lotfinity/camofox-browser-main) from ClawHub.
Skill page: https://clawhub.ai/lotfinity/camofox-browser-main
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install camofox-browser-main

ClawHub CLI

Package manager switcher

npx clawhub@latest install camofox-browser-main
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
high confidence
Purpose & Capability
Name/description, default API base URL (http://127.0.0.1:9377), and the referenced Docker container (peaceful_kare) all align with a local camofox browser automation integration. There are no unrelated binaries, cloud credentials, or surprising external services requested.
Instruction Scope
SKILL.md gives narrowly-scoped runtime steps for interacting with the local service (check /health, open/reuse tab, snapshot before/after actions, send userId, prefer sessionKey). It does not instruct the agent to read arbitrary files, access unrelated system paths, or transmit data to unexpected remote endpoints.
Install Mechanism
Instruction-only skill with no install spec and no code files — lowest-risk installation footprint.
Credentials
The instructions require including a userId and prefer a sessionKey in calls, but the skill declares no required env vars or credentials. This is likely intended as runtime/context parameters rather than static secrets, but it would be clearer if the skill documented where these values should come from and whether they may contain sensitive data.
Persistence & Privilege
always is false and the skill does not request persistent or elevated privileges or attempt to modify other skills or system-wide configs.
Assessment
This skill is coherent for controlling a local camofox browser service on localhost. Before installing or invoking it: (1) confirm you trust the local service running at 127.0.0.1:9377 (it will receive userId/sessionKey values), (2) clarify where userId and sessionKey will come from and whether they contain sensitive information you don't want sent even to localhost, and (3) ensure the referenced Docker container name is informational only — the skill does not request docker control rights. If you cannot verify the source of userId/sessionKey or the local service, avoid enabling the skill or restrict its use to a safe environment.

Like a lobster shell, security has layers — review code before you run it.

latestvk971vrp57may2s1eh81czy1vm985jjqq
45downloads
0stars
1versions
Updated 1d ago
v1.0.0
MIT-0

Use the main local camofox-browser service.

Default target:

  • API base URL: http://127.0.0.1:9377
  • Docker container: peaceful_kare

Workflow:

  1. Check /health.
  2. Open or reuse a tab.
  3. Wait/snapshot.
  4. Act.
  5. Snapshot again after state-changing actions.

Hard rules:

  • Always send userId.
  • Prefer sessionKey when creating or reusing tabs.
  • Re-snapshot after click, type, press, or navigation.
  • If the user names another browser target explicitly, stop and use that specific skill instead.

Use this as the default local camofox-browser target unless Lotfi explicitly asks for Selkies/test or the detached tailnet browser.

Comments

Loading comments...