Skip to content
← Registry
Trust Report

functions

Guide Claude through deploying serverless browser automation using the official bb CLI

28
REJECTED
Format: openclawScanner: v0.8.0Duration: 36msScanned: 6d ago · May 4, 11:10 PMSource →
Embed this badge
AgentVerus REJECTED 28AgentVerus REJECTED 28AgentVerus REJECTED 28
[![AgentVerus](https://agentverus.ai/api/v1/skill/96880eb6-70b6-4798-a61f-1167a485bd92/badge)](https://agentverus.ai/skill/96880eb6-70b6-4798-a61f-1167a485bd92)
Community Discussion

Community Comments

Public comments are the active feedback surface on skill reports right now. Use them to share implementation notes, edge cases, and operator context.

0 comments

Sign in to comment on this skill

No comments yet. Be the first to share your thoughts.

Continue the workflow

Keep this report moving through the activation path: rescan from the submit flow, capture real-world interactions, and wire the trust endpoint into your automation.

https://agentverus.ai/api/v1/skill/96880eb6-70b6-4798-a61f-1167a485bd92/trust
Personalized next commands

Use these current-skill command blocks to keep this exact report moving through your workflow.

Record an interaction
curl -X POST https://agentverus.ai/api/v1/interactions \
  -H "Authorization: Bearer at_your_api_key" \
  -H "Content-Type: application/json" \
  -d '{"agentPlatform":"openclaw","skillId":"96880eb6-70b6-4798-a61f-1167a485bd92","interactedAt":"2026-03-15T12:00:00Z","outcome":"success"}'
Fetch trust JSON
curl https://agentverus.ai/api/v1/skill/96880eb6-70b6-4798-a61f-1167a485bd92/trust

Category Scores

43
Permissions
92
Injection
23
Dependencies
87
Behavioral
70
Content
55
Code Safety

Findings (19)

mediumUnknown external reference-8

The skill references an unknown external domain which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Unknown external reference

https://browserbase.com/settings

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
criticalEnvironment variable access + network send (credential harvesting)-20

Code accesses process.env and makes outbound network requests. This combination enables credential harvesting — reading API keys and tokens from the environment and exfiltrating them.

'x-bb-api-key': process.env.BROWSERBASE_API_KEY!,

Review the code for legitimate use. If this is instructional, consider adding a safety disclaimer.

code-safetyASST-05
criticalDynamic code execution (eval / new Function)-25

eval() or new Function() detected. These execute arbitrary strings as code at runtime, enabling injection attacks and obfuscated payload delivery.

const items = await page.$$eval(params.selector, els =>

Review the code block starting at line 190. Ensure this pattern is necessary and does not pose a security risk.

code-safetyASST-10
highCapability contract mismatch: inferred credential access is not declared-15

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: Get Credentials

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-05
highCapability contract mismatch: inferred command execution is not declared-12

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: eval(

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred network access is not declared-6

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: https://browserbase.com/settings

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-04
mediumCapability contract mismatch: inferred browser automation is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: browser automation

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred local service access is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: http://127.0.0.1:14113

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCapability contract mismatch: inferred package bootstrap is not declared-8

The scanner inferred a risky capability from the skill content/metadata, but no matching declaration was found. Add a declaration with a clear justification, or remove the behavior.

Content pattern: pnpm dlx @browserbasehq/sdk-functions

Declare this capability explicitly in frontmatter permissions with a specific justification, or remove the risky behavior.

permissionsASST-03
mediumCredential access detected (inside code block)-8

Found credential access pattern: "echo "BROWSERBASE_API_KEY=$BROWSERBASE_API_KEY" >> .env"

echo "BROWSERBASE_API_KEY=$BROWSERBASE_API_KEY" >> .env

Remove references to credentials and secrets. Skills should never access sensitive authentication data.

injectionASST-05
mediumPackage-managed project bootstrap dependency-8

The skill bootstraps a package-managed project structure, which adds supply-chain exposure through manifest files, build configuration, and package-manager workflows.

package.json

Review which external services or providers the skill depends on, what data crosses that boundary, and whether the dependency is necessary for the intended workflow.

dependenciesASST-04
mediumHigh-risk workflow lacks explicit safety boundaries-15

The skill performs or enables higher-risk operations but does not define explicit safety boundaries describing what it must not do.

No safety boundary patterns found alongside high-risk capability language

Add a 'Safety Boundaries' section listing what the skill must NOT do (e.g., no file deletion, no network access beyond needed APIs).

contentASST-09
mediumMany external URLs referenced (10)-8

The skill references 10 external URLs and also discusses auth/API/payment workflows, which increases the chance that sensitive operations depend on many remote endpoints.

URLs: https://browserbase.com/settings, https://example.com, http://127.0.0.1:14113`, http://127.0.0.1:14113/v1/functions/my-function/invoke, https://news.ycombinator.com...

Minimize external dependencies to reduce supply chain risk.

dependenciesASST-04
mediumLocal service URL reference-8

The skill references a localhost or private-network service URL which is classified as medium risk. Merged overlapping signals from the repeated finding family: - Local service URL reference

http://127.0.0.1:14113`

Review localhost/private-network service references carefully. Local service URLs can expose internal apps, admin panels, or developer tooling to agent-driven workflows.

dependenciesASST-04
mediumLocal service access detected (inside code block)-5

Found local service access pattern: "http://127.0.0.1:14113"

Server runs at `http://127.0.0.1:14113`

Treat localhost and loopback services as privileged local attack surfaces. Require explicit approval, constrain reachable ports, and avoid combining local access with session reuse or tunneling.

behavioralASST-03
mediumPackage bootstrap execution detected (inside code block)-5

Found package bootstrap execution pattern: "pnpm dlx @browserbasehq/sdk-functions"

pnpm dlx @browserbasehq/sdk-functions init my-function

Surface package bootstrap commands for review. Ephemeral package execution and install-time dependency pulls increase supply-chain risk, especially when versions are not pinned or provenance is unclear.

behavioralASST-04
lowUnknown external reference-5

The skill references an unknown external domain which is classified as low risk.

https://news.ycombinator.com

Verify that this external dependency is trustworthy and necessary.

dependenciesASST-04
lowUnbounded loops or retries detected (inside code block)-3

Found unbounded loops or retries pattern: "while (true)"

while (true) {

Set maximum retry counts and loop bounds to prevent resource exhaustion.

behavioralASST-09
infoError handling instructions present

The skill includes error handling instructions for graceful failure.

Error handling patterns detected

Keep these error handling instructions.

contentASST-09