Zero Api Key Web Search

PassAudited by ClawScan on May 3, 2026.

Overview

The skill is coherent for web search and claim checking, with disclosed but notable reliance on an external package and optional Bright Data/Web Unlocker provider use.

This appears safe to consider for web search if you trust the external package. Before installing, review the PyPI/GitHub package, use the default free path for ordinary searches, and only enable Bright Data/Web Unlocker if you are comfortable sharing queries and URLs with that provider.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Users are trusting the package available from the package index, not code reviewed in this artifact set.

Why it was flagged

The skill depends on installing an external, unpinned package whose implementation is not included in the reviewed artifacts. This is user-directed and central to the skill, so it is a supply-chain note rather than a concern.

Skill content
pip install zero-api-key-web-search
Recommendation

Install only from the expected package source, consider pinning a known-good version, and review the package repository before use.

What this means

If enabled, the skill may use the user's Bright Data account and could expose usage, incur provider costs, or access provider-specific features.

Why it was flagged

The skill documents optional Bright Data credentials. This is expected for the optional provider and not required by default, but it is sensitive account access.

Skill content
export ZERO_SEARCH_BRIGHTDATA_API_KEY="..."
Recommendation

Use a scoped Bright Data key if possible, keep it out of logs and shared prompts, and disable or remove it when not needed.

What this means

Browsing blocked pages may send target URLs to an unlocking provider and may have site policy, compliance, or privacy implications.

Why it was flagged

The browsing flow can automatically fall back to a Web Unlocker for blocked pages once the provider is configured. This is disclosed and purpose-aligned, but it can access pages through an unlocking service.

Skill content
# Auto-fallback (default) — direct fetch, then unlocker on 403/429
zero-browse "https://protected-site.com/article"
Recommendation

Use Web Unlocker only for sources you are allowed to access, and prefer explicit provider selection for sensitive or regulated browsing.

What this means

Sensitive search terms, URLs, or research topics could be visible to the configured provider.

Why it was flagged

This discloses a third-party provider boundary: when configured or requested, search queries and page URLs may be sent outside the local environment.

Skill content
Bright Data is optional and should not receive queries unless configured or requested.
Recommendation

Avoid sending confidential queries or private URLs through external providers unless that is acceptable for your use case.