Fast Browser Use Local
Analysis
This is a real local browser automation tool, but it explicitly promotes anti-bot evasion and saves/reuses login cookies, so it should be reviewed carefully before use.
Findings (7)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
### 1. Bypass "Bot Detection" via Human Emulation Simulate mouse jitter and random delays to scrape protected sites.
The skill explicitly tells agents to evade anti-bot controls and scrape protected sites, which is materially riskier than ordinary user-directed browsing or DOM extraction.
let options = LaunchOptions::default().sandbox(false);
The CLI launches Chrome with the sandbox disabled in visible command paths while navigating to arbitrary web pages, and this is not clearly disclosed as a safety tradeoff.
### 3. Login & Cookie Heist Log in manually once, then steal the session for headless automation.
The wording normalizes session theft and could lead users or agents to underestimate the sensitivity of saved authentication cookies.
permissions: - network - filesystem main: index.js runtime: node
This metadata describes a Node runtime and index.js entry point, while the supplied implementation is Rust-based and the manifest does not list an index.js file.
var loadReadability = new Function(
The static scan detected dynamic JavaScript execution used for page conversion; this appears purpose-aligned for browser automation but still requires trust in the bundled scripts and invocation context.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
struct SessionData {
cookies: Vec<headless_chrome::protocol::cdp::Network::Cookie>,
...
let cookies = session.get_cookies()?;
...
fs::write(&save_session, json)?;The CLI saves browser cookies to a file and can later load them as an authenticated session, which is high-impact account/session authority.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Transport::Sse ... Transport::Http ... let bind_addr = format!("127.0.0.1:{}", cli.port);The MCP server can expose browser-control tools over local HTTP/SSE transports; it binds to localhost, but the artifacts do not show an authentication layer.
