Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Agent Browser

v0.1.0

Browser automation CLI for AI agents. Use when the user needs to interact with websites, including navigating pages, filling forms, clicking buttons, taking...

0· 440·1 current·1 all-time
byShi Xiang Yi@winchester-yi
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Benign
medium confidence
Purpose & Capability
The name/description (browser automation CLI) matches the included instructions, command reference, and templates (navigation, snapshotting, form automation, session/state management, proxies, recording, profiling). There are no unrelated credentials or binaries requested by the skill itself.
Instruction Scope
Instructions cover a wide but expected surface for a browser automation tool (snapshots, refs, state save/load, cookie/storage manipulation, JS eval, proxy configuration). These can expose sensitive data if misused (saved auth-state files contain tokens, proxy URLs may embed credentials, and 'eval' allows executing arbitrary page JS). The SKILL.md and references call out best practices (don't commit state files, use auth vault, pipe passwords), which mitigates concerns but requires user diligence.
Install Mechanism
This is instruction-only (no install spec). The templates are bash scripts provided as examples; nothing in the skill will automatically download or install executables. That lowers install-time risk. Note: the skill presumes an external 'agent-browser' CLI/binary exists on the host.
Credentials
The skill does not declare required environment variables or credentials in the registry metadata. The docs reference environment variables (AGENT_BROWSER_*, APP_USERNAME/APP_PASSWORD) that are reasonable for configuring a local CLI/tool and for automation templates. No unrelated cloud credentials or cross-service secrets are requested.
Persistence & Privilege
Skill flags are normal (always:false, model invocation allowed). The skill does instruct saving/loading local session/state files and offers templates that persist state, which is expected for browser automation but should be handled carefully; it does not request permanent platform-level privileges or modify other skills.
Assessment
This skill is internally consistent with being a CLI-based browser automation toolkit. Before installing or using it, confirm where the 'agent-browser' binary will come from (the skill provides instructions but not the executable). Review any templates before running them — they may load or save auth-state files that contain session tokens and may reference environment variables holding credentials. Avoid checking saved state into source control, prefer the provided auth-vault pattern, sanitize proxy URLs (don’t embed credentials in plain text), and be cautious with 'eval' or base64 JavaScript execution (it runs arbitrary code in page context). If you plan to run this in CI or on shared machines, isolate the environment and rotate/delete saved state files after use. If you need higher assurance, ask the publisher for the official agent-browser release/source and verify the binary before use.

Like a lobster shell, security has layers — review code before you run it.

latestvk973ss5qr7qz0c4hn1k83n0ytx82dvk1

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments