Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Safe Facebook Messenger

v1.0.2

Operate Facebook Messenger safely through a live signed-in Chrome session with remote debugging enabled using Chrome DevTools MCP. Use when sending direct me...

0· 74·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (operate Messenger via a live signed‑in Chrome session using Chrome DevTools MCP) match the instructions. The skill does not request unrelated credentials or binaries and limits its scope to Messenger/browser UI verification — this is coherent.
Instruction Scope
SKILL.md instructs the agent to inspect and interact with Messenger UI state in a signed‑in browser (headers, composer, thread snippets, search results, etc.) and to verify before typing/sending. That behavior is expected for this purpose, but it necessarily grants access to conversation content and UI state. The doc emphasizes safety and not auto‑committing sensitive messages, which is good; however it relies on the surrounding runtime/operator to avoid logging, storing, or forwarding sensitive content — those runtime behaviors are not specified here and should be validated before use.
Install Mechanism
Instruction-only skill with no install steps or external downloads. This is the lowest install risk and matches the described operation (it assumes an existing local browser/DevTools connection).
Credentials
The skill requests no environment variables or credentials, which is appropriate. However, it depends on having a signed‑in Chrome profile and an active Chrome DevTools MCP connection (i.e., a remote debugging port). Those implicit requirements are reasonable but high‑sensitivity: an exposed DevTools port or an unintended signed‑in profile could permit message access or remote control. The SKILL.md does not declare runtime logging/telemetry policies — verify that the host will not exfiltrate or persist message content.
Persistence & Privilege
always:false (normal). The skill can be invoked autonomously (platform default). Because the skill can send messages via a live signed‑in browser, prefer operator‑supervised/manual invocation as the SKILL.md recommends. Autonomous invocation combined with inadvertent access to a sensitive profile or an exposed remote debugging port could cause undesired sends; this is an operational risk rather than an internal incoherence.
Assessment
This skill is coherent for its stated purpose but requires high‑sensitivity access: it controls a live, signed‑in Chrome session via DevTools (remote debugging). Before installing or enabling it: - Only use with an intentionally chosen browser/profile that is signed in to the correct Messenger account (not your primary personal/work profile). - Ensure the DevTools remote debugging port is bound to localhost or a trusted network and not exposed to the internet. - Prefer manual/operator-supervised invocation; do not grant blanket autonomous sends. - Confirm your runtime (the agent host) does not log, upload, or otherwise persist message contents or UI snapshots — ask the integrator for a logging/telemetry policy. - If you need stronger assurance, request the full runtime wiring or code that will drive DevTools MCP and inspect it (or run in a sandboxed test profile first). If you are uncomfortable giving any tool access to a signed‑in browser profile, do not install/enable this skill.

Like a lobster shell, security has layers — review code before you run it.

Scrubbed testing datavk976thw2h9d8v7e3g5rqypq7vh83c0sylatestvk97aym3rarcw063mdtx90apdbd83dapk

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments