Seo Scout Pro

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This SEO tool mostly scouts website forms, but it also teaches stealthy automation and account-session reuse that can bypass site protections.

Review carefully before use. It may be acceptable for authorized form discovery, but do not use the stealth, anti-detect, Cloudflare bypass, or authenticated submission guidance against sites where you lack permission. Keep credentials out of shared configs, avoid personal OAuth sessions, and inspect any external CLI/helper code before running it.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using this as written could cause an agent to automate activity against third-party sites in ways that violate site rules, trigger blocks, or create abuse risk.

Why it was flagged

The skill instructs use of stealth/rebrowser automation for sites with basic Cloudflare WAF protection, which can facilitate evasion of anti-bot controls rather than only passive form analysis.

Skill content
Loads target URL in stealth browser ... Level 1: Basic WAF ... rebrowser-playwright: ✅ Works ... Basic WAF → Use rebrowser ✅
Recommendation

Use only on sites you own or have explicit permission to test; avoid anti-detect/stealth bypass modes, require manual approval before submissions, and respect robots.txt, rate limits, and site terms.

What this means

An agent could act through the user's web accounts or stored credentials on arbitrary submission sites, creating account, privacy, and unauthorized-action risk.

Why it was flagged

The skill advises storing credentials and reusing cached OAuth sessions, while the metadata declares no credential requirement and the artifacts do not define scope, storage protections, or user approval boundaries.

Skill content
Store credentials in config.yaml ... Subsequent: auto-select cached Google account ... Tip: do all OAuth sites in one browser session
Recommendation

Use separate low-privilege accounts, avoid raw password storage, do not reuse personal OAuth sessions, and require explicit user confirmation before any authenticated action.

What this means

The scanned package does not show all implementation code a user might be told to run.

Why it was flagged

The instructions reference CLI and browser helper code that is not present in the provided two-file manifest, so any user following those examples would need to inspect additional code outside this reviewed artifact set.

Skill content
node src/cli.js scout https://target-directory.com --deep ... import { withBrowser, delay, humanType } from '../browser.js';
Recommendation

Before running the referenced Node CLI or generated adapters, review the actual repository files, dependencies, and lockfiles.