Brightdata

WarnAudited by ClawScan on May 10, 2026.

Overview

The Bright Data integration is mostly transparent, but its search helper has unsafe cursor handling that could allow crafted input to trigger unintended Bash execution.

Review before installing. The Bright Data API usage is clear and purpose-aligned, but the search script should validate that the cursor is numeric before use. Only use the scraping function on approved public URLs and avoid sending sensitive links or tokens to Bright Data.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent or user passes untrusted text as the cursor, the helper may run unexpected local shell behavior instead of only selecting a search-results page.

Why it was flagged

The second command-line argument is documented as a numeric page cursor, but it is used directly in Bash arithmetic expansion without validation. Bash arithmetic can evaluate variable contents as expressions, so crafted non-numeric cursor values can cause unintended behavior and may enable command-execution patterns rather than simple pagination.

Skill content
CURSOR="${2:-0}"
...
URL="https://www.google.com/search?q=$(echo "$QUERY" | sed 's/ /+/g')&hl=en&gl=us&num=10&start=$((CURSOR * 10))"
Recommendation

Validate the cursor before arithmetic, for example require `[[ "$CURSOR" =~ ^[0-9]+$ ]]`, reject anything else, and avoid evaluating untrusted strings in Bash arithmetic.

What this means

The agent could scrape sites in ways that may violate a site’s terms, trigger Bright Data account costs, or be inappropriate without user approval.

Why it was flagged

The anti-bot/CAPTCHA-bypass capability is disclosed and aligned with Bright Data scraping, but it is broad and applies to arbitrary public URLs.

Skill content
Both bypass bot detection and CAPTCHAs.
...
- `url`: Any public URL (required).
Recommendation

Use only on URLs the user has approved and is allowed to access; consider adding explicit guidance to avoid protected, private, or terms-restricted targets.

What this means

Actions run through this skill use the user’s Bright Data account and quota.

Why it was flagged

The script uses the user’s Bright Data API key to authenticate requests, which is expected for this provider integration.

Skill content
-H "Authorization: Bearer $BRIGHTDATA_API_KEY"
Recommendation

Provide a scoped Bright Data key where possible and monitor usage; do not expose the key in prompts, logs, or shared environments.

What this means

Search terms and scraped URLs, including any sensitive query parameters in those URLs, may be sent to Bright Data.

Why it was flagged

User-selected URLs are transmitted to Bright Data’s API for scraping. This is expected for the skill, but it is an external provider data flow.

Skill content
-d "{\"zone\":\"$BRIGHTDATA_UNLOCKER_ZONE\",\"url\":\"$URL\",\"format\":\"markdown\"}" \
  https://api.brightdata.com/request
Recommendation

Avoid scraping URLs containing private tokens, account-specific links, or confidential query parameters unless sharing them with Bright Data is acceptable.