Xbrowser

PassAudited by VirusTotal on May 9, 2026.

Overview

Type: OpenClaw Skill Name: xbrowser Version: 1.0.0 The xbrowser skill bundle provides browser automation with a 'login-state reuse' feature that involves copying entire user browser profiles (including cookies and session data) from system locations to its own state directory via `robocopy` or `rsync` in `scripts/xb.cjs`. It also downloads and executes an external binary engine (`agent-browser`) from various npm registries (e.g., mirrors.tencent.com) during the `setup` command. While these high-risk capabilities are documented and intended for the stated purpose of web automation, the handling of sensitive browser data and the execution of remote artifacts represent a significant security risk without further sandboxing.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may use this higher-privilege real-browser automation path even when a safer built-in browser tool would be enough.

Why it was flagged

This directs the agent to override normal tool choice for every browser task, not just when the user explicitly wants this skill.

Skill content
EXCLUSIVE browser automation — REPLACES built-in Browser Automation and playwright-cli. For ANY browser task ... MUST use this skill instead of built-in tools.
Recommendation

Limit the skill to explicit user requests or tasks that require real browser state, and avoid global instructions that replace user or platform tool choices.

What this means

If used with a logged-in browser, the agent may act as the user on websites and handle session tokens equivalent to credentials.

Why it was flagged

The skill can use or export authenticated browser state from a logged-in local browser, which can grant account access under the user's identity.

Skill content
从已登录的浏览器导出 State ... 使用本地浏览器(保留登录态) ... Cookie 已在运行时解密
Recommendation

Prefer the clean built-in Chrome for Testing profile unless login reuse is necessary; use dedicated low-privilege accounts, approve any state export, and avoid sharing saved state files.

What this means

Future tasks may inherit prior login state, and leaked state files could let someone access accounts without a password.

Why it was flagged

Browser authentication state is automatically persisted and can be reused across sessions or saved to files containing credential-equivalent tokens.

Skill content
Cookie 和 localStorage 在会话间自动保存和恢复 ... State 文件包含 session token,等同于账号凭证
Recommendation

Use encryption with AGENT_BROWSER_ENCRYPTION_KEY, keep state files out of git and shared folders, run cleanup when finished, and avoid persistent sessions for sensitive sites.

What this means

First use may download additional code and browser binaries into the local OpenClaw state directory.

Why it was flagged

The runtime setup can fetch and unpack external browser automation components. This is expected for the skill's purpose, but it is still a supply-chain dependency users should notice.

Skill content
`xb setup` 安装/更新 agent-browser CLI 引擎和 Chrome for Testing 浏览器 ... 下载 → 解压 → 验证
Recommendation

Run setup only when expected, verify the source and version of downloaded components where possible, and prefer trusted network/package sources.