ZappushZappush
SkillsUse CasesBenchmarkCommunitySign In
      Back to Skills
      georges91560

      Safety Report

      Virtual Desktop — Universal Browser Execution

      @georges91560

      Gives any OpenClaw agent a persistent headless browser running inside the Docker container. Full autonomous execution layer: navigate any website, click, typ...

      18Downloads
      0Installs
      1Stars
      2Versions
      CLI & Shell Tools1,805Browser Automation1,737DevOps & Infrastructure1,045Legal & Compliance738

      Security Analysis

      medium confidence
      Suspicious0.08 risk

      The skill's stated purpose (persistent headless browser) is plausible, but several operational choices and metadata (broad network targets, Telegram exfiltration note, generic required credentials, and runtime code-write) are disproportionate or ambiguous and warrant manual review before installing.

      Mar 14, 20263 files5 concerns
      Purpose & Capabilitynote

      Claiming a persistent Playwright-based browser fits the stated capability and required binaries (python3, playwright). However, declaring PLATFORM_EMAIL and PLATFORM_PASSWORD as required top-level env vars is odd: the code and docs say per-platform env var names will be passed in at runtime, so requiring generic PLATFORM_* at install/registration is inconsistent and could coerce users into supplying broad credentials unnecessarily.

      Instruction Scopeconcern

      SKILL.md instructs the agent to create a browser_control.py file in /workspace/skills via a heredoc, read and write many workspace files (sessions, audit, logs, .learnings), and to persist session JSONs containing auth tokens. Metadata also states that screenshots and action confirmations will be sent over the agent's existing Telegram channel. Those behaviors (writing executable code at runtime, persistent session storage, automated screenshot posting) expand the scope well beyond a simple 'navigation helper' and could leak sensitive data if not tightly controlled.

      Install Mechanismnote

      There is no formal install spec (instruction-only), which reduces supply-chain risk, but the SKILL.md explicitly writes Python code into the container at setup time (cat heredoc → /workspace/skills/virtual-desktop/browser_control.py). That gives the skill persistent code on disk and effectively performs an installation step via instructions—review the generated code before executing it.

      Credentialsconcern

      The skill requires PLATFORM_EMAIL and PLATFORM_PASSWORD at registration and marks PLATFORM_EMAIL as primaryEnv, yet the documentation claims it will only read env vars when explicitly asked. The required read paths include user files (/workspace/USER.md, /workspace/TOOLS.md) which may contain PII/credentials. Metadata allows outbound requests to https://*.* (very broad) and automatic sending of screenshots via Telegram—both increase exfiltration risk and are not narrowly scoped to specific target services.

      Persistence & Privilegeconcern

      The skill persists session tokens, logs, screenshots, and writes the browser_control.py helper into workspace directories so state survives across runs. While always:false (not force-included), these persistent artifacts combined with broad network behavior and automated Telegram posting raise the risk profile: stored tokens and screenshots could be exfiltrated if the agent or skill is misused.

      Guidance

      Before installing, review the exact browser_control.py content that the skill will write to your container. Do not set global/high-privilege account credentials into PLATFORM_EMAIL/PLATFORM_PASSWORD—prefer per-service, least-privilege env vars passed only when needed. Limit the skill's outbound network access (avoid allowing https://*.*), and confirm how screenshots and session files are transmitted/stored; disable automatic Telegram posting unless you audit the implementation. Run the skill in an isolated container with no access to sensitive host mounts and periodically rotate or delete saved session files. If you lack the ability to review the generated Python file yourself, treat this skill as high-risk and do not install.

      Latest Release

      v1.0.1

      ## virtual-desktop 1.0.1 Changelog - Added explicit documentation of required environment variables (PLATFORM_EMAIL and PLATFORM_PASSWORD) and notes on secure usage. - Network request metadata now specifies operator-authorized platforms and clarifies configuration at runtime by the principal. - Documented Telegram usage: skill sends action confirmations and screenshots via the agent’s existing Telegram channel (no extra bot needed). - Refined metadata to clarify security practices, workspace paths, and environment variable handling. - No code changes; documentation and metadata improvements only.

      More by @georges91560

      Anti-Injection-Skill

      7 stars

      Polymarket Executor

      1 stars

      Skill Combinator — Emergent Capabilities Engine

      1 stars

      wesley dashboard builder

      0 stars

      Agent Shark Mindset

      0 stars

      smart-security

      0 stars

      Published by @georges91560 on ClawHub

      Zappush© 2026 Zappush
      HomeGuaranteeSupport

      Something feels unusual? We want to help: [email protected]