Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Scrapeless Webunlocker Skill

v1.0.0

Bypass website blocks and scrape web content using Scrapeless Universal Scraping API.

0· 185·0 current·0 all-time
byscrapeless@scrapelesshq

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for scrapelesshq/scrapeless-webunlocker-skill.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Scrapeless Webunlocker Skill" (scrapelesshq/scrapeless-webunlocker-skill) from ClawHub.
Skill page: https://clawhub.ai/scrapelesshq/scrapeless-webunlocker-skill
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install scrapeless-webunlocker-skill

ClawHub CLI

Package manager switcher

npx clawhub@latest install scrapeless-webunlocker-skill
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The skill's name/description, SKILL.md, README, and script are coherent: it calls the Scrapeless Universal Scraping API and needs an API token. However the registry metadata reported at the top lists no required env vars while SKILL.md and scripts require X_API_TOKEN, an inconsistency that should be resolved.
Instruction Scope
Runtime instructions and the script are scoped to building a payload and POSTing it to https://api.scrapeless.com/api/v2/unlocker/request. This means any URL, custom headers, POST data, or selectors you provide will be transmitted to the external Scrapeless service (and billed). That behavior matches the stated purpose but has privacy/billing implications that users must consider.
Install Mechanism
No install spec in the registry (instruction-only with packaged Python script). requirements.txt lists only 'requests' and 'python-dotenv' — no suspicious download/install URLs or archive extractions were present.
Credentials
Requesting a single API credential (X_API_TOKEN) is proportional to the described functionality. The inconsistency between registry metadata (no env vars) and SKILL.md/script (requires X_API_TOKEN) is the main concern. The skill reads .env (repo root) which is normal but means tokens in that file will be used and potentially transmitted to the external API.
Persistence & Privilege
The skill is not marked 'always: true' and does not request special persistent privileges. It does not modify other skills or system settings based on the provided files.
What to consider before installing
Before installing: - Confirm the skill's source and that scrapeless.com is the intended provider (repository source was 'unknown'). - Expect that every target URL, headers, and request body you give will be sent to Scrapeless and could be stored or billed — do not send sensitive private URLs or credentials. - Provide a dedicated, limited-scope API token (not reuse high-privilege secrets) and keep it out of public repos (.env should not be committed). - Resolve the metadata inconsistency: the registry should declare X_API_TOKEN as required (SKILL.md already does). - If you care about data locality/privacy, review Scrapeless's privacy/billing policies and TLS endpoint (api.scrapeless.com) and consider testing with non-sensitive targets first. - If uncertain about provenance, run the script in an isolated environment or review the full code (the main network call is a single POST to api.scrapeless.com) before granting the token.

Like a lobster shell, security has layers — review code before you run it.

latestvk974d22vrk4da7azywkskgbs4h8371mf
185downloads
0stars
1versions
Updated 1h ago
v1.0.0
MIT-0

WebUnlocker OpenClaw Skill

Use this skill to bypass website blocks and scrape web content using the Scrapeless Universal Scraping API. It supports JavaScript rendering, CAPTCHA solving, IP rotation, and intelligent request retries.

Authentication: Set X_API_TOKEN in your environment or in a .env file in the repo root.

Errors: On failure the script writes a JSON error to stderr and exits with code 1.


Usage

Command:

python3 scripts/webunlocker.py --url "https://example.com"

Examples:

# Scrape HTML content
python3 scripts/webunlocker.py --url "https://httpbin.io/get"

# Scrape plain text
python3 scripts/webunlocker.py --url "https://example.com" --response-type plaintext

# Scrape as Markdown
python3 scripts/webunlocker.py --url "https://example.com" --response-type markdown

# Take a screenshot
python3 scripts/webunlocker.py --url "https://example.com" --response-type png

# Capture network requests
python3 scripts/webunlocker.py --url "https://example.com" --response-type network

# Extract specific content types
python3 scripts/webunlocker.py --url "https://example.com" --response-type content --content-types emails,links,images

# Use a specific country proxy
python3 scripts/webunlocker.py --url "https://example.com" --country US

# Use POST method
python3 scripts/webunlocker.py --url "https://httpbin.org/post" --method POST --data '{"key": "value"}'

# Add custom headers
python3 scripts/webunlocker.py --url "https://example.com" --headers '{"User-Agent": "Mozilla/5.0"}'

# Use custom proxy
python3 scripts/webunlocker.py --url "https://example.com" --proxy-url "http://your-proxy-url:port"

# Enable JavaScript rendering
python3 scripts/webunlocker.py --url "https://example.com" --js-render

# Enable JavaScript rendering with headless mode
python3 scripts/webunlocker.py --url "https://example.com" --js-render --headless

# Enable JavaScript rendering and wait for specific element
python3 scripts/webunlocker.py --url "https://example.com" --js-render --wait-selector "body > div > p:nth-child(3) > a"

# Bypass Cloudflare protection with JavaScript rendering
python3 scripts/webunlocker.py --url "https://example.com" --js-render

# Bypass Cloudflare Turnstile challenge
python3 scripts/webunlocker.py --url "https://2captcha.com/demo/cloudflare-turnstile-challenge" --js-render --headless --response-type markdown

Summary

ArgumentDescriptionDefault
--urlTarget URLRequired
--methodHTTP methodGET
--redirectAllow redirectsFalse
--headersCustom headers as JSON stringNone
--dataRequest data as JSON stringNone
--response-typeResponse type (html, plaintext, markdown, png, jpeg, network, content)html
--content-typesContent types to extract (comma-separated)None
--countryCountry code for proxyANY
--proxy-urlCustom proxy URLNone
--js-renderEnable JavaScript renderingFalse
--headlessRun browser in headless modeFalse
--wait-selectorWait for element with this selector to appearNone

Output: All commands return JSON objects with the scraped content or Cloudflare bypass results.


Response Types

HTML

Returns the HTML content of the page as an escaped string.

Plaintext

Returns the plain text content of the page, removing all HTML tags.

Markdown

Returns the page content formatted as Markdown for better readability.

PNG/JPEG

Returns a base64 encoded string of the page screenshot.

Network

Returns all network requests made during page load, including URLs, methods, status codes, and headers.

Content

Returns specific content types extracted from the page, such as emails, phone numbers, headings, images, audios, videos, links, hashtags, metadata, tables, and favicon.


Notes

⚠️ Timeout Policy:

  • Page load timeout: 30 seconds
  • Global execution timeout: 180 seconds

⚠️ Supported CAPTCHAs:

  • reCaptcha V2
  • Cloudflare Turnstile
  • Cloudflare Challenge

⚠️ Rate Limits:

  • 429 errors indicate rate limit exceeded. Reduce request frequency or upgrade plan.

⚠️ Billing:

  • Charges are applied on a per-request basis
  • Only successful requests will be billed

Comments

Loading comments...