Camofox Browser Selkies Test

v1.0.0

Use the Selkies test browser stack for desktop-stream/browser-in-desktop checks, Selkies-specific debugging, and viewport/mobile-context experiments. Trigger...

0· 49·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for lotfinity/camofox-browser-selkies-test.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Camofox Browser Selkies Test" (lotfinity/camofox-browser-selkies-test) from ClawHub.
Skill page: https://clawhub.ai/lotfinity/camofox-browser-selkies-test
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install camofox-browser-selkies-test

ClawHub CLI

Package manager switcher

npx clawhub@latest install camofox-browser-selkies-test
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description match the instructions: the skill is explicitly for the Selkies test browser stack and references local test endpoints, a Docker container name, and a test image. Nothing requested is unrelated to that purpose.
Instruction Scope
Instructions tell the agent to use local services on 127.0.0.1:9378 and 127.0.0.1:3003, a Docker container name, and an image reference. This is expected for a test/debugging skill, but it means the agent will be expected to probe local endpoints and potentially interact with local Docker if asked — verify you want the agent to be able to access local services.
Install Mechanism
No install spec and no code files — lowest-risk form (instruction-only). There is no downloaded code or external install URL.
Credentials
The skill declares no environment variables, credentials, or config paths. The references to local endpoints and a Docker image are proportional to the stated debugging/test purpose.
Persistence & Privilege
Default invocation settings (not always:true). The skill does not request persistent system presence or special privileges in its metadata.
Assessment
This skill appears coherent for local Selkies test/debug use. Before enabling: confirm you are comfortable with the agent probing local endpoints (127.0.0.1:9378 and :3003) and referencing Docker/container state; if you don't want the agent to access local services, do not allow autonomous invocation. The SKILL.md references a Docker image (medtouadmin/camofox-browser:selkies-beta) — if the agent is ever asked to pull or run that image, confirm the image source/trustworthiness and avoid providing Docker Hub or registry credentials unless necessary. If you need stronger assurances, ask the skill author for provenance of the test image and an explicit list of allowed commands the agent may run against local services.

Like a lobster shell, security has layers — review code before you run it.

latestvk97btsspbpx7d1ypjnkd682r6d85jkgm
49downloads
0stars
1versions
Updated 2d ago
v1.0.0
MIT-0

Use the Selkies test browser stack.

Default targets:

  • camofox-browser API: http://127.0.0.1:9378
  • Selkies UI: http://127.0.0.1:3003
  • Docker container: camofox-selkies-test
  • Current pushed image reference: medtouadmin/camofox-browser:selkies-beta

Use this skill for:

  • Selkies stream/websocket debugging
  • browser-in-desktop validation
  • viewport/mobile-context experiments tied to the Selkies test stack
  • reproducing issues specific to the test image/container

Hard rules:

  • Treat this as separate from the main camofox-browser service.
  • If the task is about the shared remote browser over tailnet CDP, use browser-cdp-tailnet instead.
  • If the task is about the default local service on 127.0.0.1:9377, use camofox-browser-main instead.

Comments

Loading comments...