Agent Vision Scraper

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill is a browser scraper that openly automates CAPTCHA and anti-bot bypass and exposes a no-password VNC session, so it needs careful review before use.

Install only if you need authorized browser automation and understand the risks. Do not use it to bypass protections on third-party sites without permission. Before running it, inspect or obtain the missing Dockerfile, pin dependencies, restrict API keys, and secure or disable the VNC port.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The tool could be used to bypass website protections, automate logins, submit forms, or scrape sites that intentionally try to block bots, which can create legal, account, or abuse risks.

Why it was flagged

The executable code enables stealth browser behavior and instructs the LLM-driven browser to solve CAPTCHA challenges and continue the task, making anti-bot/CAPTCHA bypass an active runtime behavior rather than just documentation.

Skill content
chromium.use(StealthPlugin()); ... “识别出验证码的内容后,找到对应的输入框或坐标,执行填写或点击操作。验证通过后,继续执行核心任务。”
Recommendation

Use only on sites you own or are explicitly authorized to test. Add clear policy limits and require explicit user confirmation before solving CAPTCHAs, logging in, submitting forms, or scraping protected services.

What this means

Someone who can reach the VNC port may view or interfere with the browser session, including pages, scraped data, login flows, and credentials typed into websites.

Why it was flagged

The documented VNC interface exposes the live browser session without a password. With `-p 5900:5900`, the port may be reachable beyond the local machine depending on Docker and firewall configuration.

Skill content
运行时映射了 5900 端口,可用 VNC 客户端连接查看浏览器操作过程 ... 地址: `localhost:5900` ... 密码: 无(免密)
Recommendation

Do not expose VNC without authentication. Bind it to localhost only, add a strong VNC password, or omit the port mapping unless interactive viewing is required.

What this means

Sensitive webpage contents may be shared with the configured LLM provider during automation.

Why it was flagged

The workflow sends browser screenshots to an LLM for visual analysis. This is purpose-aligned for a vision scraper, but screenshots may contain page content, account data, or credentials.

Skill content
视觉分析 - 截图发送给 LLM 分析
Recommendation

Avoid using this on sensitive accounts or confidential pages unless the LLM provider, data handling, and retention policies are acceptable.

What this means

If broad or production API keys are used, the automation may consume quota/costs or expose data to the associated provider account.

Why it was flagged

The skill may use external provider credentials supplied through the environment. This is expected for LLM vision use, but the keys grant spending and provider-account authority.

Skill content
OPENAI_API_KEY=sk-xxx ... ANTHROPIC_API_KEY=sk-ant-xxx
Recommendation

Use restricted, dedicated API keys with spending limits and rotate them after testing.

What this means

Users cannot fully verify the container build from the provided artifacts and may be pushed toward creating or using an unreviewed image.

Why it was flagged

The documentation relies on a Dockerfile to define the runtime image, but the supplied file manifest does not include a Dockerfile or install spec. For a browser-control tool, that missing build artifact is a material provenance gap.

Skill content
docker build -t agent-scraper-image . ... ├── Dockerfile           # Docker 镜像定义
Recommendation

Provide the Dockerfile, lockfiles, and a complete install spec, or avoid instructing users to build/run an image whose contents are not included in the reviewed package.