sf-scrapper
Analysis
This skill is coherent, but it should be reviewed because it deliberately uses your logged-in SAP SuccessFactors Chrome session to scrape sensitive employee profile data, including batches.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
If user provides multiple employee IDs, iterate through each one sequentially using the same workflow. Collect results and present as a table.
Batch browser automation is disclosed and aligned with the purpose, but it can bulk-collect HR profile data without stated quantity limits or a separate confirmation step.
Source: unknown Homepage: none No install spec — this is an instruction-only skill.
There is no executable install path, but the skill has limited provenance information, so users cannot easily verify its origin or maintainer context.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Always use `profile="chrome"` — never `profile="openclaw"` (we need the user's authenticated session).
The skill intentionally uses the user's existing authenticated Chrome/SAP SuccessFactors session rather than a separate scoped credential or isolated browser profile.
