Dogfood
Analysis
This is a coherent QA skill, but it can immediately drive a browser through a full app, perform create/edit/delete testing, and save authenticated session state and evidence files.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
| **Scope** | Full app | ... "start immediately with defaults" ... "Try realistic end-to-end workflows (create, edit, delete flows)."
The combination of immediate default execution, full-app scope, and CRUD/delete testing can cause changes in the target application before the user has explicitly bounded the test environment or approved destructive actions.
allowed-tools: Bash(agent-browser:*), Bash(npx agent-browser:*) ... Always use `agent-browser` directly -- never `npx agent-browser`.
The granted tool surface includes an npx path that the workflow itself says is unnecessary, adding a low-level package/provenance surface if used.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
agent-browser --session {SESSION} fill @e2 "{PASSWORD}" ... agent-browser --session {SESSION} state save {OUTPUT_DIR}/auth-state.jsonThe skill handles login credentials and then persists authenticated browser state, which may contain cookies or session tokens.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Produces a structured report with full reproduction evidence -- step-by-step screenshots, repro videos ... agent-browser --session {SESSION} record start {OUTPUT_DIR}/videos/issue-{NNN}-repro.webmCapturing screenshots, videos, and reports is central to the QA purpose, but those persistent artifacts may include sensitive application, customer, or account data.
