Android Remote Browser Debug

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a coherent Android browser debugging skill, but it can inspect and run JavaScript in a live mobile browser session, so users should use it only on intended pages and clean up any saved debug output.

Install only if you intentionally want the agent to debug an Android browser via USB/ADB. Before use, verify the device and target tab, close unrelated sensitive pages, review any JavaScript to be executed, and remove ADB forwards plus temporary output files after debugging.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on the wrong tab or with unsafe JavaScript, the agent could read page data or change page state in the user's mobile browser session.

Why it was flagged

The skill documents using raw Chrome DevTools Protocol commands to evaluate arbitrary JavaScript in the connected mobile browser. This is central to the debugging purpose, but it can affect whatever authenticated page is selected.

Skill content
method: 'Runtime.evaluate', params: { expression: 'YOUR_JS_HERE', returnByValue: true }
Recommendation

Use it only after confirming the connected device and target tab, and review JavaScript expressions before running them.

What this means

The agent may be able to inspect pages, network activity, DOM contents, screenshots, and session-backed web app state from the connected phone browser.

Why it was flagged

Forwarding the browser DevTools socket gives local access to the phone browser's current tabs, which may include authenticated sessions. This is expected for remote debugging but should be treated as privileged access.

Skill content
/Users/song/Library/Android/sdk/platform-tools/adb forward tcp:9222 localabstract:chrome_devtools_remote
Recommendation

Close unrelated sensitive tabs, use a trusted device, and disconnect/remove the ADB forward when debugging is finished.

What this means

The skill may fail or use whatever local ADB/Node/ws installation is available, so tool provenance is left to the user.

Why it was flagged

The instructions rely on local tools and a Node WebSocket dependency, while the registry metadata declares no required binaries or install specification. This is not suspicious by itself, but users must supply and trust these local dependencies.

Skill content
ADB 已安装(Android SDK platform-tools) ... const WebSocket = require('ws');
Recommendation

Install ADB and Node dependencies from trusted sources and adjust the hard-coded ADB path to the user's own SDK location.

What this means

Debug artifacts may remain on disk after the session and could include private web page or app data.

Why it was flagged

The skill recommends redirecting debug output to temporary files. Since the same skill can collect DOM snapshots, network information, console logs, and screenshots, those files may retain sensitive page content locally.

Skill content
node tmp_phone_debug.js > /tmp/phone_out.txt 2>&1
Recommendation

Delete temporary output files after debugging and avoid capturing sensitive pages unless necessary.