Xbrowser
PassAudited by VirusTotal on May 9, 2026.
Overview
Type: OpenClaw Skill Name: xbrowser Version: 1.0.0 The xbrowser skill bundle provides browser automation with a 'login-state reuse' feature that involves copying entire user browser profiles (including cookies and session data) from system locations to its own state directory via `robocopy` or `rsync` in `scripts/xb.cjs`. It also downloads and executes an external binary engine (`agent-browser`) from various npm registries (e.g., mirrors.tencent.com) during the `setup` command. While these high-risk capabilities are documented and intended for the stated purpose of web automation, the handling of sensitive browser data and the execution of remote artifacts represent a significant security risk without further sandboxing.
Findings (0)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The agent may use this higher-privilege real-browser automation path even when a safer built-in browser tool would be enough.
This directs the agent to override normal tool choice for every browser task, not just when the user explicitly wants this skill.
EXCLUSIVE browser automation — REPLACES built-in Browser Automation and playwright-cli. For ANY browser task ... MUST use this skill instead of built-in tools.
Limit the skill to explicit user requests or tasks that require real browser state, and avoid global instructions that replace user or platform tool choices.
If used with a logged-in browser, the agent may act as the user on websites and handle session tokens equivalent to credentials.
The skill can use or export authenticated browser state from a logged-in local browser, which can grant account access under the user's identity.
从已登录的浏览器导出 State ... 使用本地浏览器(保留登录态) ... Cookie 已在运行时解密
Prefer the clean built-in Chrome for Testing profile unless login reuse is necessary; use dedicated low-privilege accounts, approve any state export, and avoid sharing saved state files.
Future tasks may inherit prior login state, and leaked state files could let someone access accounts without a password.
Browser authentication state is automatically persisted and can be reused across sessions or saved to files containing credential-equivalent tokens.
Cookie 和 localStorage 在会话间自动保存和恢复 ... State 文件包含 session token,等同于账号凭证
Use encryption with AGENT_BROWSER_ENCRYPTION_KEY, keep state files out of git and shared folders, run cleanup when finished, and avoid persistent sessions for sensitive sites.
First use may download additional code and browser binaries into the local OpenClaw state directory.
The runtime setup can fetch and unpack external browser automation components. This is expected for the skill's purpose, but it is still a supply-chain dependency users should notice.
`xb setup` 安装/更新 agent-browser CLI 引擎和 Chrome for Testing 浏览器 ... 下载 → 解压 → 验证
Run setup only when expected, verify the source and version of downloaded components where possible, and prefer trusted network/package sources.
