Back to plugin
Pluginv1.8.15
ClawScan security
Camofox Browser · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 29, 2026, 7:46 AM
- Verdict
- benign
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The package and runtime instructions are internally consistent with an anti-detection headless browser server: required env vars, file reads, subprocesses, and telemetry are explained and usable for the described features, but a few user-facing risks (cookie import, default telemetry, large binary download) deserve attention before installing.
- Guidance
- This plugin appears to be what it claims, but review the following before installing: - Cookie import: The camofox_import_cookies flow reads Netscape-format cookie files from ~/.camofox/cookies and will POST cookie data to the Camofox server. Only enable and set CAMOFOX_API_KEY if the server is truly local or access-controlled; otherwise you risk sending sensitive cookies to a remote process. The plugin documents path-traversal protection and a 5MB/500-cookie limit, but you should still validate workflows before importing real account cookies. - Telemetry: Crash/hang telemetry is enabled by default and posts anonymized data to https://camofox-telemetry.askjo.workers.dev/report. If you prefer no outbound telemetry, set CAMOFOX_CRASH_REPORT_ENABLED=false or change CAMOFOX_CRASH_REPORT_URL to a self-hosted endpoint and review lib/reporter.js. The publisher claims domains are HMAC-hashed and no page content, cookies, IPs, or tokens are sent; read the reporter code if you need assurance. - Binary download & subprocesses: Running the server will download a ~300MB Camoufox binary from GitHub releases (camoufox-js fetch) and spawn browser subprocesses (Camoufox) and optionally yt-dlp. Ensure you trust the Camoufox upstream and have sufficient disk/network resources. - Network exposure: By default the server listens on localhost:9377. If you expose it externally, set CAMOFOX_ACCESS_KEY to require Bearer auth for routes. The README explicitly warns to only set sensitive keys when the server is local or access-controlled. - Audit recommended files: If you want higher assurance, review lib/reporter.js (telemetry payload/anonymization), lib/cookies.js (cookie parsing and path handling), lib/launcher.js (process spawning), and any default endpoints in server.js. Also confirm any CI/workflow artifacts (Dockerfile, Makefile) meet your deployment policies. Overall: internally coherent for its purpose; be cautious with cookie import and default telemetry settings and ensure proper access controls when running the server.
Review Dimensions
- Purpose & Capability
- okName/description (anti-detection browser for AI agents) matches the included code and declared capabilities: a patched Firefox build (Camoufox) downloaded at runtime, REST API routes, cookie import, proxy support, VNC, and optional yt-dlp. The env vars declared (CAMOFOX_API_KEY, CAMOFOX_ACCESS_KEY, crash report toggles) align with features listed (cookie import gating, global access key, telemetry). No unrelated credentials or binaries are requested.
- Instruction Scope
- noteRuntime instructions and the plugin explicitly direct reading local cookie files under ~/.camofox/cookies for cookie import and instruct the agent to POST those cookies to the server (gated by CAMOFOX_API_KEY). That behaviour is consistent with the stated cookie-import feature, but it means local browser cookies can be read and transmitted to the server when cookie-import is used — ensure the server is local or access-controlled before enabling. The SKILL.md and README otherwise avoid vague 'gather context' instructions and scope subprocesses to launcher/plugins.
- Install Mechanism
- okThe registry entry is instruction-only (no platform install spec). The package contains full source and relies on camoufox-js to download Camoufox binaries (~300MB) from GitHub releases; that is documented. Downloading a large trusted binary from GitHub releases is expected for this product. No opaque URL shorteners or personal servers are used for core runtime artifacts; telemetry endpoint is a Cloudflare Worker (configurable).
- Credentials
- noteRequired env vars are optional and map to explicit features. CAMOFOX_API_KEY gates cookie import (sensible), CAMOFOX_ACCESS_KEY gates global API access (sensible). Telemetry is enabled by default and sends anonymized crash/hang reports to an external endpoint (default CAMOFOX_CRASH_REPORT_URL). The package documents opt-out (CAMOFOX_CRASH_REPORT_ENABLED=false) and self-host override. Cookie import will expose cookies if you enable it — only set CAMOFOX_API_KEY if the server is local or access-controlled.
- Persistence & Privilege
- okThe skill does not request 'always: true'. It persists session profiles and optional traces under ~/.camofox/, which is consistent with session persistence and trace features. Plugins spawn subprocesses for Camoufox and optional yt-dlp in dedicated launcher modules. The skill does not modify other skills' configs or request system-wide privileges beyond its documented file paths.
