Browser Use 2.0.0 Local

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill is a coherent browser-automation wrapper, but it grants broad browser, session-cookie, cloud/tunnel, and code-execution capabilities without clear scoping or approval boundaries.

Install only if you need powerful browser automation and are comfortable supervising it. Prefer a separate test browser profile, avoid using existing logged-in Chrome profiles, review every cookie/cloud/tunnel/Python action, and close all browser-use sessions when finished.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could interact with websites as the logged-in user, including viewing or changing account data, if asked or misdirected.

Why it was flagged

The skill can direct the agent to use a real Chrome profile containing existing authenticated sessions, giving it access to accounts the user is already logged into.

Skill content
browser-use --profile "Default" open <url>      # Real Chrome with Default profile (existing logins/cookies)
Recommendation

Use a dedicated test browser profile with no sensitive logins, and require explicit user confirmation before actions on authenticated sites.

What this means

The agent has broad ability to click, type, upload files, manipulate cookies, call cloud API passthroughs, and operate sessions through this CLI.

Why it was flagged

The allowed tool scope covers the entire browser-use command namespace, not just low-risk actions like opening pages or taking screenshots.

Skill content
allowed-tools: Bash(browser-use:*)
Recommendation

Narrow the allowed commands where possible, and require user approval for uploads, authenticated-site changes, cookie operations, cloud calls, or destructive actions.

What this means

If invoked carelessly, the agent may run arbitrary local Python through the browser-use CLI rather than only performing browser actions.

Why it was flagged

The skill documents a browser-use subcommand that executes Python code with persistent variables, which is broader than ordinary browser clicking or extraction.

Skill content
browser-use python "code"                 # Execute Python (variables persist across calls)
Recommendation

Avoid using the Python execution mode unless the user explicitly requests it and understands what code will run.

What this means

A local service or browser-related endpoint could be made reachable outside the machine if the tunnel command is used without care.

Why it was flagged

The documented tunnel feature can expose a local port through an external service, but the artifact does not describe authentication, intended ports, or data-boundary safeguards.

Skill content
browser-use tunnel <port>                 # Start Cloudflare tunnel (idempotent)
Recommendation

Only start tunnels for specific user-approved ports, verify what is exposed, and stop tunnels when finished.

What this means

Security depends on which browser-use binary is installed locally, even though the skill package itself contains no runnable code.

Why it was flagged

The scanner could not inspect the actual browser-use CLI implementation; the skill relies on a locally installed external command.

Skill content
No install spec — this is an instruction-only skill. No code files present — this is an instruction-only skill.
Recommendation

Install browser-use only from a trusted source, keep it updated, and verify the local binary before giving it access to real browser profiles or accounts.

What this means

Browser tabs, sessions, or authenticated state may remain active until the user or agent closes them.

Why it was flagged

The persistence is disclosed and there is a cleanup command, but users should notice that browser state continues beyond a single command.

Skill content
A background daemon keeps the browser open across commands
Recommendation

Run browser-use close or browser-use close --all after sensitive work, and avoid leaving logged-in sessions open.