Back to skill
Skillv1.0.0
ClawScan security
Agent Stealth Scraper · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 3, 2026, 3:13 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill claims powerful Cloudflare/Turnstile bypass capabilities but provides no code, no install steps, no dependencies, and no provenance—this mismatch between claims and what is required/instructed is suspicious.
- Guidance
- This package is essentially a one-page marketing stub claiming advanced Cloudflare/Turnstile bypass without any source code, install steps, dependencies, or homepage. Before installing or enabling it, ask the publisher for: (1) source code or a trustworthy release URL, (2) a clear runtime dependency list (browsers, captchasolvers, libraries) and network endpoints it will contact, and (3) legal/ethical guidance for use (bypassing protections can violate terms of service or law). Do not provide any credentials to this skill. If you want to test it, run it in an isolated sandbox or ephemeral environment and inspect network activity and filesystem changes. If the author cannot supply verifiable code and provenance, treat the skill as untrusted and avoid enabling it in production.
Review Dimensions
- Purpose & Capability
- concernThe name/description claim 'native bypass for Cloudflare Turnstile and interstitial pages' and high-performance scraping, but the skill declares no binaries, no packages, no credentials, no config paths, and no source or homepage. Implementing reliable anti-bot bypass typically requires headless-browser tooling (e.g., Puppeteer/Playwright), third-party captcha-solving services, or platform-specific binaries; none are requested or documented. The capability claimed is therefore disproportionate to the tiny, instruction-only manifest.
- Instruction Scope
- concernSKILL.md contains only a high-level marketing description and a single example CLI invocation (npx openclaw skill run ...). It does not describe what the agent should actually do at runtime (no commands, no network endpoints, no libraries to call). The instructions are vague and grant broad, undefined discretion: a real scraper-with-bypass would need detailed runtime steps. This ambiguity increases risk because the skill could later be implemented as arbitrary behavior without matching the declared metadata.
- Install Mechanism
- okNo install spec and no code files are present, so nothing will be written to disk or automatically installed by the skill bundle itself. That reduces immediate supply-chain risk. However, absence of an install step also means the skill is currently a stub/marketing doc rather than a functioning implementation.
- Credentials
- noteThe skill declares no required environment variables, credentials, or config paths. That is proportionate in the sense of not requesting secrets, but it is inconsistent with the claimed functionality (bypassing anti-bot systems commonly requires third-party services or binaries). The lack of any declared credentials or endpoints is a red flag for completeness/provenance, though not directly an exfiltration risk in its current form.
- Persistence & Privilege
- okThe skill is not marked 'always: true' and uses default invocation settings. It is user-invocable and the agent may call it autonomously (the platform default), which is normal. There is no evidence this skill requests persistent or elevated platform privileges beyond standard skill invocation.
