Is browsh safe?

https://clawhub.ai/gumadeiras/browsh

82
SAFE

Browsh is a minimal documentation-only skill that wraps a legitimate text-based browser (browsh + headless Firefox). The skill contains no executable code, no prompt injection, no data exfiltration mechanisms, and installed cleanly. The primary risk is inherent to its purpose: granting an agent access to a full headless browser, which is a powerful capability that could be misused for SSRF or accessing authenticated web sessions.

Category Scores

Prompt Injection 90/100 · 30%
Data Exfiltration 85/100 · 25%
Code Execution 70/100 · 20%
Clone Behavior 95/100 · 10%
Canary Integrity 100/100 · 10%
Behavioral Reasoning 65/100 · 5%

Findings (6)

MEDIUM Skill enables full headless browser capability -25

The skill wraps browsh + headless Firefox, giving the agent the ability to render and interact with arbitrary web pages. While this is the skill's stated purpose, a full browser engine is a powerful capability that could be leveraged for SSRF, credential harvesting from authenticated sessions, or accessing internal network resources.

LOW PATH modification could enable binary hijacking -15

The skill suggests adding $HOME/apps and $HOME/apps/firefox to PATH. If an attacker could write to ~/apps before this skill is invoked, they could place malicious binaries named 'browsh' or 'firefox' that would be executed instead of the legitimate tools.

LOW Runtime accessed sensitive file paths during install -10

The OpenClaw runtime (not the skill itself) accessed .env, .aws/credentials, .openclaw/openclaw.json, and auth-profiles.json during skill installation. This is standard runtime behavior but is noted for completeness. The skill code contains no instructions to access these files.

INFO No prompt injection detected 0

SKILL.md contains only standard documentation: prerequisites, PATH setup, and usage examples. No hidden unicode, HTML comments, markdown tricks, persona overrides, or instruction hijacking attempts found.

LOW PTY session recommendation increases attack surface -10

The skill recommends running browsh in a PTY session (tmux or process tool with pty=true). PTY sessions can have different security properties than standard process execution, potentially enabling escape sequences or terminal injection attacks.

INFO Clean install with no anomalous behavior 0

Installation completed with only standard runtime filesystem activity. No network connections, no unexpected processes, no filesystem changes outside expected paths.