Google Research Pro
Analysis
Review recommended because this instruction-only skill asks the agent to run an unbundled local Python/Playwright script to bypass Google bot checks and post results to Telegram.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Command: python C:\Users\Admin\OneDrive\Desktop\LearnOpCL\bot.py "{keyword}"The skill directs the agent to execute a local Python file that is not part of the provided instruction-only artifact, with user input passed as an argument.
Performs advanced Google searches using Playwright to bypass bot detection
The stated mechanism is to evade an external service's bot-detection controls using browser automation, with no clear rate limits or guardrails.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Use environment variables or a secure vault for sensitive data (e.g., Telegram bot token, Google account credentials if needed).
The skill anticipates possible use of Telegram or Google credentials, but the registry declares no credential or env-var contract.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Sends the formatted summary to the specified Telegram channel ... Destination: Telegram channel/user ID
Telegram delivery is disclosed and purpose-aligned, but it sends query-derived output to an external messaging destination.
