Firecrawl CLI

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This is a transparent Firecrawl CLI reference for web scraping and browser automation, but it requires trusting an external CLI, Firecrawl credentials, and optional browser-session state.

Before installing, verify the Firecrawl CLI package, use a dedicated API key if possible, set crawl limits, confirm any browser actions that could change website state, and avoid reusing browser profiles that contain sensitive logins unless that is intentional.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing a global CLI means trusting that npm package to run on the local machine during install and use.

Why it was flagged

The skill requires installing a global npm package outside the artifact set. This is expected for a CLI integration, but users should verify the package source before installing.

Skill content
npm install -g firecrawl-cli
Recommendation

Install only from the official Firecrawl package/source, consider pinning a version, and run it with least-privileged local permissions.

What this means

The agent may use a Firecrawl account/API key and consume credits while scraping, crawling, searching, or running browser sessions.

Why it was flagged

The skill uses Firecrawl account authentication and may consume account credits. This is expected for the service, but it is not reflected in the registry credential declarations.

Skill content
Requires firecrawl-cli installed ... and authentication (firecrawl login or FIRECRAWL_API_KEY env var).
Recommendation

Use a dedicated Firecrawl API key where possible, monitor credit usage, and revoke/logout credentials when no longer needed.

What this means

Unbounded crawls or browser actions could consume credits, interact with websites, or perform actions the user did not intend.

Why it was flagged

The reference exposes broad crawling and cloud browser automation, including click/fill actions and Python/JavaScript execution in the browser session. These are aligned with the stated purpose but can be high-impact if used without clear user direction.

Skill content
firecrawl crawl https://example.com --crawl-entire-domain --wait ... firecrawl browser execute "click @e5" ... firecrawl browser execute --python 'await page.goto(...)'
Recommendation

Use explicit target URLs, crawl limits, and user confirmation before large crawls, form submissions, account actions, or other non-read-only browser automation.

What this means

A reused browser profile may retain cookies or other session state, which can affect later automation and expose sensitive account context to future tasks.

Why it was flagged

Saved browser profiles can persist browser state across sessions. If used after logging into sites, that state may include sensitive session information.

Skill content
firecrawl browser launch-session --profile myprofile   # Save/reuse browser state
Recommendation

Use throwaway profiles for general scraping, avoid logging into sensitive accounts unless necessary, and clear/logout browser state after use.