๐ Protected via Cloudflare Access
Browser Session Isolation โ ClawHub Skills Review
Our Problem
Per-session browser isolation without config writes that crash the gateway. We want each OpenClaw session (thread) to get its own isolated browser context (cookies, storage, state).
Tier 1: Best Candidates (local, session-isolated, no cloud dependency)
1. ๐ agent-browser by @thesethrose
โญ 762 stars ยท 171k downloads ยท 3,400 installs โ most popular browser skill on ClawHub
- Session isolation:
agent-browser --session <name>creates fully isolated Playwright contexts - How it works: Rust CLI + Node.js fallback, runs its own Playwright instance independently of OpenClaw's browser
- State persistence:
agent-browser state save/load auth.jsonfor reusable auth - Parallel: Multiple
--sessioncontexts can run simultaneously - Security scan: Benign (high confidence)
- Install:
npm i -g agent-browser - Pros: Battle-tested, fast (Rust), deterministic ref-based interaction, zero OpenClaw config writes, parallel sessions native
- Cons: Separate CLI from OpenClaw browser tool โ agents need to learn different commands. Not integrated with OpenClaw's
before_tool_callhooks. - Verdict: ๐ข Top pick for session isolation. Most mature, most installs, clean architecture.
2. browser-secure by @riverho
926 downloads ยท 0 installs
- Session isolation: Incognito by default, or
--profilefor named Chrome profiles - Profile creation:
browser-secure profile --create "Name" --launch - Security: Vault integration (Bitwarden/1Password), approval gates, audit logging, 30-min session timeout
- Security scan: Suspicious (medium) โ concern about
launchPersistentContextmodifying profile data - Verdict: ๐ก Interesting security model but overkill and unproven (0 installs).
3. ubuntu-browser-session by @linsuisheng034
Security scan: Benign (high confidence)
- One-per-site profile model, Xvfb + noVNC handoff
- Verdict: ๐ด Linux-only โ we're on macOS.
4. ghost-browser by @neothelobster
- Python daemon,
nodriver(stealth Chrome), profile create/clone/delete - Security scan: Suspicious โ broken packaging
- Verdict: ๐ด Broken packaging, 0 installs.
Tier 2: Cloud Browser Services
5. browserbase-sessions / browserbase
- Each API session is inherently isolated (cloud browser)
- Named contexts for persistent auth, CAPTCHA solving, session recording
- Cost: Paid API required
- Verdict: ๐ก Natural isolation but cloud-dependent + cost.
6. steel-browser / browser-steel
- Each Steel.dev session = fresh browser
- Cost: Steel API key required
- Verdict: ๐ก Cloud-dependent.
Tier 3: Limited / Doesn't Solve Our Problem
7. browser-automation-v2
- Wraps OpenClaw's browser CLI, adds concurrency lock
- Verdict: ๐ด Same underlying OpenClaw browser โ doesn't solve config write problem.
8. use-browser
--session NAMEworks but designed for social media automation- Verdict: ๐ก Session isolation works but niche purpose.
9. neo-browser
- CDP + Chrome extension, per-domain API schemas
- Verdict: ๐ก API discovery tool, not session isolation focused.
10. multi-user-privacy
- Per-user subagent routing with memory isolation
- Verdict: ๐ก Session isolation at message level, not browser level.
๐ Recommendation: agent-browser
- 762โญ, 3,400+ installs โ battle-tested
--session <name>= instant isolation โ separate cookies/storage per context- Zero OpenClaw config writes โ no gateway restarts
- State save/load for persistent auth
- Rust-fast with Node.js fallback
- Benign security scan
Plan: Install agent-browser, disable our custom plugin, use --session flag keyed to OpenClaw session IDs. Optionally write a thin before_tool_call hook to translate OpenClaw browser calls โ agent-browser calls.