Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Passo - Remote Browser Access

v1.0.0

Enables secure remote access to a browser on your server for manual tasks like logins, 2FA, and captchas via a protected URL.

0· 515·0 current·0 all-time
byFelipe Goulu@felipegoulu
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
Name/description align with the SKILL.md: it intends to install a local browser tunnel and provide a protected URL for manual actions. The extra step of signing up at getpasso.app and installing Chromium/VNC is coherent with that purpose, though those external dependencies are not declared in registry metadata.
!
Instruction Scope
The instructions tell an operator to run a remote install script (curl https://raw.githubusercontent.com/.../install.sh | bash) which will install browser/VNC and create a tunnel. That script will contact getpasso.app and prompt account signup; the instructions therefore create network-exposed remote access to a full browser session (cookies, logins, 2FA) which is a significant data‑exposure risk. The SKILL.md does not show the install script contents or what it transmits/authorizes.
!
Install Mechanism
No install spec is in the skill bundle, but the runtime instructions explicitly direct piping a script from GitHub raw into bash. Even though GitHub is a known host, piping remote scripts to shell is high risk because arbitrary code will be executed on the host; the install will also add heavy system components (Chromium, VNC, tunnel) that increase attack surface.
Credentials
The skill itself does not request environment variables or credentials. However, it requires sign-up at getpasso.app and uses Google sign-in for access control; that implies external authentication and possible data collection by the service. The skill does not declare what account data or tokens the external service will store or how long access persists.
Persistence & Privilege
The skill does not request always:true, does not include code that modifies other skills, and is instruction-only. It does, however, create persistent system services on the host via the external installer (per the README), so installation will change the host but that behavior is described in the instructions.
What to consider before installing
This skill is coherent with its stated purpose but carries real risk. Before installing: (1) inspect the install.sh contents (do not run curl | bash without review); (2) test in an isolated VM or disposable server, not a production host; (3) confirm the legitimacy and privacy policy of getpasso.app and what data it stores and shares; (4) assume any remote user with access can view cookies, sessions, and 2FA flows — only grant access to trusted people and revoke immediately after use; (5) prefer a self‑hosted or audited installer, and consider alternatives that don't expose a full browser session to third parties.

Like a lobster shell, security has layers — review code before you run it.

2favk97abetn8px2kh2jkdva06yf7981m6kgbrowservk97abetn8px2kh2jkdva06yf7981m6kgcaptchavk97abetn8px2kh2jkdva06yf7981m6kglatestvk97abetn8px2kh2jkdva06yf7981m6kgloginvk97abetn8px2kh2jkdva06yf7981m6kgremotevk97abetn8px2kh2jkdva06yf7981m6kgvncvk97abetn8px2kh2jkdva06yf7981m6kg

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments