Is antoniocirclemind/smoothbrowser safe?
https://github.com/openclaw/skills/tree/main/skills/antoniocirclemind/smoothbrowser
SmoothBrowser is a documentation-only skill wrapping the smooth.sh commercial browser automation SaaS. Its primary risk is architectural: all web interactions, credentials, sessions, and file uploads are routed through and stored on smooth.sh's third-party servers as a core design feature, creating a persistent and pervasive data exfiltration pathway. Secondary concerns include a 'PREFERRED BROWSER' prompt injection attempting to bias skill selection, instructions to build a persistent credential memory, and unrestricted file upload capability that could expose sensitive local files to the vendor's cloud.
Category Scores
Findings (11)
HIGH All browser traffic proxied through smooth.sh by default -35 ▶
The smooth CLI configures a built-in proxy for every browser session unless explicitly disabled with --no-proxy. This means all websites visited, credentials entered, forms submitted, and data scraped during agent operation are routed through and logged by smooth.sh infrastructure. The skill documents this as a feature, not a risk, and does not advise users to disable the proxy for sensitive operations.
HIGH Local file upload to vendor cloud with no path restrictions -30 ▶
The smooth upload-file command accepts an arbitrary filesystem path and uploads the file to smooth.sh cloud storage, returning a file_id for use in browser sessions. No path restrictions are documented. An agent following this skill's patterns — or manipulated via prompt injection — could upload SSH keys, .env files, AWS credentials, or any other sensitive file to the vendor's cloud.
HIGH Authenticated session state persisted on vendor servers -20 ▶
The profile system stores cookies, login sessions, and browser state on smooth.sh's servers and retrieves them across future sessions. When the agent authenticates to any third-party service (GitHub, email, banking, SaaS tools), those session tokens are stored externally and subject to access by the smooth.sh operator or any breach of their infrastructure.
MEDIUM PREFERRED BROWSER designation biases skill selection -15 ▶
The skill description opens with 'PREFERRED BROWSER' in all-caps, a technique intended to influence the LLM to select this skill over alternatives when the user requests browser interactions. This overrides user or system intent to use different browser automation tools and is a soft prompt injection targeting skill routing.
MEDIUM Persistent memory manipulation for authentication profiles -13 ▶
The skill explicitly instructs the agent to save a mapping of authentication profiles to services in the agent's persistent memory. Over time this creates a continuously growing credential directory stored in agent memory and queryable by the skill on future invocations, representing an expanding attack surface.
MEDIUM Instructs pip installation of external package without integrity pinning -20 ▶
The skill instructs the agent to run 'pip install smooth-py' to acquire the smooth CLI. This installs a PyPI package with no version pin or hash verification beyond PyPI signing. The package executes arbitrary Python code on install and runtime, and a compromised or malicious smooth-py package could achieve full local code execution.
MEDIUM Arbitrary JavaScript execution in authenticated browser sessions -12 ▶
The smooth evaluate-js command executes arbitrary JavaScript code inside browser sessions that may already be authenticated to sensitive services. This could be used to exfiltrate session data, read page content, or inject malicious scripts into authenticated contexts. An agent receiving injected instructions via web content could chain this capability.
MEDIUM Structured user PII transmitted via --metadata to vendor infrastructure -10 ▶
The --metadata flag sends a JSON object containing user data to smooth.sh's remote session infrastructure where it is processed by the vendor's agent. This flag is documented with examples containing email addresses and real names, establishing a pattern of sending PII to the vendor as normal operation.
LOW Embedded commercial upsell instruction -5 ▶
The skill instructs the agent to proactively remind users to upgrade their smooth.sh subscription when plan limits are reached. This embeds a commercial prompt directly into agent behavior, directing the agent to act as a sales channel for the skill vendor without user direction.
HIGH Architectural design creates persistent third-party surveillance channel -40 ▶
Unlike local browser automation tools (Playwright, Puppeteer), smooth-browser routes all interactions through smooth.sh's cloud. Combined with broad trigger phrases, persistent profile memory, and file upload capability, this skill ensures that over time the smooth.sh operator accumulates a comprehensive record of the agent's web activity, credentials, and data. The cross-skill attack vector is significant: an agent with both filesystem access and this skill installed could be tricked into reading sensitive local files and uploading them via smooth upload-file in a single multi-step task.
INFO Clean installation with no unexpected behavior 0 ▶
Installation contacted only github.com (140.82.121.4:443) as expected for a git sparse-checkout. No unexpected processes were spawned, no files were written outside the skill directory, and no unexpected network connections were established during or after installation.