Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Camoufox
v1.0.0Anti-detect browser automation using Camoufox (Firefox-based). Use instead of Chrome/Playwright for bot-detection-heavy sites like X/Twitter, Naver, and other protected sites. Provides stealth browsing with OS/browser fingerprint spoofing, humanized mouse movements, and persistent sessions.
⭐ 1· 2.7k·8 current·10 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
Name, description, and bundled scripts (browse.py, login_session.py, setup.sh) consistently implement an anti-detect Firefox-based automation workflow: creating a venv, installing a Python package named 'camoufox', running a browser with persistent profile and VNC/Xvfb support. However the skill metadata lacks a homepage or source repo for the camoufox package and the registry owner is opaque, which reduces transparency and raises concern about the origin of the code being installed.
Instruction Scope
SKILL.md instructs the user to run scripts/setup.sh which performs system installs and pip install without verification, and to use VNC for manual CAPTCHA/login flows. The runtime instructions explicitly persist session state and user profiles (~/.openclaw/camoufox-profile), which will store cookies/tokens and could contain credentials. While these behaviors are coherent with the stated goal (persistent sessions, manual login), they expand the attack surface (saved sessions + interactive VNC login) and enable credential capture if misused or if the installed package is malicious.
Install Mechanism
There is no packaged install spec; the provided setup.sh uses pip install camoufox (un-pinned, no hash) and may run sudo apt install for system deps. Installing an unverified PyPI package and running system package installs via sudo is moderate-to-high risk because the package origin/version are not pinned and install-time code can execute. There are no downloads from arbitrary URLs, but lack of a repository/homepage makes verifying the package contents difficult.
Credentials
The skill does not request cloud credentials or environment variables in metadata, which is appropriate. It does create and use local directories and a venv in the user's home by default, and accepts proxy strings (including credentials) at runtime. The main proportional concern is that persisted profiles will hold cookies/session tokens — appropriate for the feature but sensitive in practice.
Persistence & Privilege
The skill is not force-enabled (always:false) and uses default autonomous invocation. It writes only to user-scoped paths (~/.openclaw/workspace and ~/.openclaw/camoufox-profile) and creates a virtualenv. The setup script may call sudo to install system packages (apt/Xvfb), which requires elevated privileges at install time — expected for installing system-level deps but worth noting.
What to consider before installing
Before installing: 1) Verify the 'camoufox' package source — look up its PyPI page and linked repository, confirm maintainers and recent activity; if no repo/homepage exists, treat the package as untrusted. 2) Review the package contents (e.g., pip download + inspect wheel) in an isolated environment before running setup.sh. 3) Be cautious about running setup.sh on a shared/production host — it may invoke sudo apt and will install and import third‑party code. 4) Expect persistent profiles to store cookies and session tokens; do not use with accounts holding sensitive data unless you trust and have audited the package. 5) If you decide to proceed, prefer running inside an isolated VM/container, pin the camoufox version, avoid providing real credentials during initial tests, and audit network activity during setup and runtime. 6) Also consider legal/ethical implications: tools explicitly designed to evade bot detection may violate service terms of use.Like a lobster shell, security has layers — review code before you run it.
latestvk97bhvks5jyyqkxr37h4ytmymx80hcy8
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
