urlgo
v3.1.0All network operations must be handled through this skill
Security Scan
OpenClaw
Suspicious
high confidencePurpose & Capability
The name/description and the files consistently describe a browser-control skill that centralizes web/network actions via a local Chrome/Edge CDP on port 9022. Requiring access to local browser processes and a debugging port is consistent with that purpose. However, the scale of system-level operations (pkill/lsof/kill, starting browsers from system paths) is higher-privilege than many users would expect from a generic 'network operations' skill and may be surprising.
Instruction Scope
The SKILL.md and step files explicitly instruct the agent to run local system commands: curl against localhost:9022, pkill to terminate browser processes, start Edge/Chrome with --remote-debugging-port=9022, use lsof/kill, and then connect via browser_use connect_cdp. After connecting the skill exposes operations that can read cookies, history, DOM snapshots, network requests, and screenshots. These actions go beyond simple navigation: they can access sensitive local browser state and require modifying running processes. There are no instructions to restrict which browser profile is used or to sandbox the browser.
Install Mechanism
This is an instruction-only skill with no install spec and no code files — no artifacts are downloaded or written by the skill itself. That reduces installation risk, but runtime commands still interact with system processes and files.
Credentials
The skill declares no environment variables or external credentials, but by enabling CDP and connecting to a local browser it implicitly grants access to cookies, history, and authenticated sessions. That implicit access is sensitive and not reflected in requires.env. Additionally, SKILL.md metadata contains auto_load/global flags (auto_load: true, global: true) which conflict with the registry-level flags (always:false) and may indicate unexpected auto-enablement behavior.
Persistence & Privilege
Registry flags show always:false, but SKILL.md metadata includes auto_load: true and global: true — this inconsistency is concerning because auto-loading a skill that can manage browsers and access cookies increases attack surface. The skill allows agent autonomous invocation (default), and combined with its ability to start/kill browsers and access CDP-managed data, an autonomous agent could perform sensitive actions without clear user consent.
What to consider before installing
Before installing, consider that this skill will: (1) attempt to kill existing browser processes and start browsers with --remote-debugging-port=9022, which can interrupt your sessions; (2) enable CDP connections that can read cookies, history, network requests, DOM, and screenshots — effectively exposing logged-in sessions; (3) run local shell commands (pkill, lsof, kill, curl) that require system-level access; and (4) contains SKILL.md metadata (auto_load/global) inconsistent with registry flags, which may cause unexpected auto-enablement. If you need this functionality, run it only in an isolated environment or machine account without sensitive browser profiles, require explicit user consent before any kill/start operations, verify whether the skill will be auto-loaded, and restrict autonomous invocation. If you cannot accept those risks, do not install or grant this skill elevated privileges.Like a lobster shell, security has layers — review code before you run it.
automationbrowsercdplatestnetworkweb
🌐 Browser Control Skill
The only entry point for all browser operations
⚠️ IRON RULE
All web-related tasks MUST use this skill! DO NOT use browser_use start/open directly!
⚠️ 按需读取铁律
SKILL.md 只是入口!不要一次性读取所有步骤文档!
- 先读 SKILL.md 确定入口步骤
- 按入口指引读取对应 step 文档
- step 文档读完后根据结果决定跳转到哪个 step
- 一步一步读,不要批量读取!
🚀 启动流程入口
第一步:读取 steps/01-detect-cdp.md
该文档会告诉你:
- 如何检测 9022 端口状态
- 根据检测结果决定下一步跳转到哪个 step
流程图:
入口: 读取 steps/01-detect-cdp.md
↓
检测 9022 端口
↓
┌────┴────┐
↓ ↓
已开启 未开启
↓ ↓
Step 4 Step 2 → Step 3 → Step 4
(连接) (检测OS) (启动) (连接)
🔧 Startup Modes
| Mode | Command | Description |
|---|---|---|
| Normal | {"action": "start"} | Private browser, cookies NOT exposed |
| CDP | {"action": "start", "cdp_port": 9022} | Exposes debugging port |
| Visible | {"action": "start", "headed": true} | Shows real browser window |
| CDP+Visible | {"action": "start", "cdp_port": 9022, "headed": true} | Both features |
🎯 All browser_use Actions
Startup & Connection
| Action | Description |
|---|---|
start | Start browser |
start cdp_port | Start with CDP exposed |
start headed | Start visible browser |
connect_cdp | Connect to existing browser |
list_cdp_targets | Scan CDP ports |
stop | Stop/disconnect |
Page Operations
| Action | Description |
|---|---|
open | Open URL in new tab |
navigate | Navigate in current page |
navigate_back | Go back |
Content Retrieval
| Action | Description |
|---|---|
snapshot | Get page DOM structure |
screenshot | Take screenshot |
console_messages | Get console logs |
network_requests | Get network requests |
Interaction
| Action | Description |
|---|---|
click | Click element |
type | Type text |
fill_form | Fill form fields |
select_option | Select dropdown |
hover | Hover element |
drag | Drag element |
press_key | Press keyboard key |
Special Operations
| Action | Description |
|---|---|
evaluate | Execute JavaScript |
run_code | Run code |
wait_for | Wait for condition |
handle_dialog | Handle dialogs |
file_upload | Upload files |
Browser Management
| Action | Description |
|---|---|
tabs | Manage tabs |
resize | Resize window |
pdf | Export PDF |
clear_browser_cache | Clear cache |
cookies_get/set/clear | Cookie operations |
🚨 Trigger Scenarios
- Open webpage, visit website, browse
- Check prices, stocks, market data
- Read news, browse info
- Login websites, auto-login
- Screenshot, webpage capture
- Web automation
- Any task requiring browser
🔒 Privacy Notes
| Mode | Cookies | History |
|---|---|---|
| Normal | ❌ No | ❌ No |
| CDP | ✅ Yes | ✅ Yes |
| connect_cdp | ✅ Yes | ✅ Yes |
📝 Version 3.1.0
改进:按步骤入口、按需读取,避免一次性读取所有文档导致上下文膨胀
Comments
Loading comments...
