plugins/ruflo-browser/skills/browser-login/SKILL.md
Authenticate against a target site once, then vault the resulting session credentials so subsequent skills (browser-extract, browser-form-fill, browser-test) can reuse them without re-driving the auth flow. Borrows the pattern from Browserbase's cookie-sync/SKILL.md but stores the resulting context in AgentDB rather than on a hosted backend.
browser-record.browser_fill / browser_type. Credentials come from the user or environment; do not read them from .env or paste them into the trajectory args.--mfa): pause for user input or invoke the user's TOTP helper; capture only the resulting redirect, not the code itself.browser_eval:
document.cookie // returns the cookie string for the active document
# Each cookie value passes aidefence_scan to flag raw secrets / high-entropy tokens.
browser-cookies:
npx -y @claude-flow/cli@latest memory store --namespace browser-cookies \
--key "<host>" \
--value "{vault_handle:<opaque>, expiry:<iso>, aidefence_verdict:safe}"
browser_cookie_use MCP tool.<redacted> placeholder for values.browser_cookie_use MCP tool is reserved (ADR-0001 §7) but not yet implemented. Until then, downstream skills mount the vaulted cookies via a helper bash function in scripts/ (TBD).browser-login. Do not attempt to fingerprint-match yourself.