Remote Browser

AdvisoryAudited by Static analysis on May 8, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If used on sensitive websites, the agent could perform real clicks, typing, or submissions in a remote browser.

Why it was flagged

The skill exposes broad browser-control operations. This matches the remote-browser purpose, but users should recognize that these actions can submit forms, change account state, or interact with sites as the user.

Skill content
Supports both DOM-oriented automation and remote-desktop/VNC control... DOM (`/action`) `click`, `type`, `fill`, `press`... VNC (`/vnc/action`) `click`, `type`, `press`
Recommendation

Use it only for intended sites, and require explicit user confirmation before logins, purchases, form submissions, account changes, or public posts.

What this means

Anyone who obtains the token could potentially access or control the user’s remote browser sessions.

Why it was flagged

Authentication is expected for this service, but the token controls access to remote browser sessions; query-string tokens are especially easy to expose in logs or histories.

Skill content
Auth — Pass `Authorization: Bearer <token>` or `X-API-Key`, or `?access_token=<token>`
Recommendation

Prefer Authorization headers over query-string tokens, use least-privilege/short-lived tokens if available, and rotate tokens if exposed.

What this means

The user must trust an external service with URLs, page contents, screenshots, typed text, and possibly logged-in browser activity without much provenance information.

Why it was flagged

The skill depends on a remote browser service that will receive browsing activity and API requests, but the supplied metadata does not provide a verifiable source or homepage for assessing provenance.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the operator and security posture of the remote service before use, and avoid sensitive accounts unless you trust the provider.

What this means

Sensitive logged-in browser state could persist beyond a single task and be reused in later sessions.

Why it was flagged

The skill supports stored and restored browser sessions, and ephemeral mode is optional. Stored browser sessions can retain cookies, login state, history, or prior page context, but retention and deletion boundaries are not clearly described.

Skill content
Or restore — Use stored session from `GET /api/stored-sessions`... Fork from stored session... `{"ephemeral": true}`
Recommendation

Use ephemeral sessions for sensitive work, close/delete sessions when finished, and avoid logging into high-value accounts unless session storage and deletion controls are clear.