Browser Fu

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This instruction-only browser helper is coherent, but it encourages using your logged-in browser session and direct website API calls without tight scope or approval controls.

Install only if you are comfortable with the agent helping automate websites and inspect API traffic. Before use, require it to ask before using your logged-in browser profile, cookies, or authenticated/internal APIs, and keep the task limited to specific sites and read-only data unless you explicitly approve otherwise.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI03: Identity and Privilege Abuse
Medium
What this means

The agent could act as the logged-in user on websites and access private account data if invoked on a login-gated page.

Why it was flagged

This tells the agent to use the user's logged-in browser profile and session cookies. That is sensitive delegated account authority, but the metadata declares no credential requirement and the instruction is not limited to specific sites, accounts, or user-approved sessions.

Skill content
Login wall | Try to automate login | Use `profile="user"` for existing session cookies
Recommendation

Require explicit user approval before using a logged-in browser profile or cookies, limit use to the named site and task, and avoid exposing cookies in prompts, logs, or command output.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

The agent may make broad or authenticated requests to a website and retrieve more data than the user intended, potentially violating site rules or exposing private information.

Why it was flagged

The skill encourages raw API calls, cookie-authenticated requests, and bulk pagination. This is central to the skill's purpose, but it bypasses the safer UI workflow and does not clearly require read-only validation, throttling, or user approval for authenticated/internal APIs.

Skill content
Once you find the endpoint, call it directly: ... curl -s "https://example.com/api/v1/items?page=1&limit=100" \
  -H "Cookie: session=..." ... Loop through pages until you get all the data.
Recommendation

Ask the user before calling internal or authenticated APIs, confirm endpoints are read-only, throttle requests, avoid mutations, and document exactly what data will be collected.