cside Site Scanner

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may visit the target site, run the site’s scripts in a browser context, and capture visible page state.

Why it was flagged

The skill relies on browser automation and page-context JavaScript against a user-supplied URL. This is central to website scanning and no destructive action is instructed, but it can load third-party code and trigger normal page side effects.

Skill content
Use `browser-use open <url>` ... Use `browser-use screenshot` ... Execute JavaScript in the page to collect:
Recommendation

Scan only sites you own or have permission to test, respect the stated rate limit, and prefer an isolated browser profile for untrusted sites.

What this means

If used while logged in, the agent may see cookie names, domains, and security attributes for the scanned site.

Why it was flagged

Cookie metadata can reveal session or account context if the scan is run in an authenticated browser. The instruction asks for metadata rather than cookie values and is aligned with the stated cookie-security audit.

Skill content
Extract all cookies: name, domain, secure flag, httpOnly flag, sameSite, expiration
Recommendation

Use a fresh or unauthenticated browser profile for scans, and ensure reports do not include cookie values or other secrets.

What this means

Storage metadata from the scanned site could enter the agent’s context or report.

Why it was flagged

Browser storage can contain application or user-specific data. The artifact only instructs checking usage, not persisting or exporting values, but the data source is sensitive on authenticated pages.

Skill content
Check localStorage and sessionStorage usage
Recommendation

Keep storage inspection limited to security-relevant metadata and avoid reading, storing, or sharing localStorage/sessionStorage values unless the user explicitly requests it.