OpenClaw + Steel Browser: Let Your AI Agent Fill the Forms

OpenClaw + Steel Browser: Let Your AI Agent Fill the Forms

Apr 9, 2026

Apr 9, 2026

/

San Francisco

/

Dane Wilson

Nikola Balic

Nikola Balic

OpenClaw can shell out. Give it Steel CLI and the steel-browser skill and it has a real cloud browser: stealth mode, proxies, CAPTCHA solving, computer actions via Playwright. We pointed it at the AI Engineer World's Fair call for speakers and told it to apply.

It took 15 minutes. Swyx is probably not happy about what got submitted. OpenClaw did it.

Setup

Install Steel CLI:

curl -LsSf https://setup.steel.dev | sh
curl -LsSf https://setup.steel.dev | sh
curl -LsSf https://setup.steel.dev | sh
curl -LsSf https://setup.steel.dev | sh

Install the browser skill:

npx skills add https://github.com/steel-dev/cli --skill
npx skills add https://github.com/steel-dev/cli --skill
npx skills add https://github.com/steel-dev/cli --skill
npx skills add https://github.com/steel-dev/cli --skill

Get a free API key at app.steel.dev. Paste it in chat when OpenClaw asks. Better: add it as an environment variable through OpenClaw's interface so it's not sitting in your conversation history.

What happened

We gave OpenClaw one instruction:

I would like to submit an application for the call for speakers for AI Engineer World's Fair. Could you figure out what the fields are, what we need, and how I can apply to become a speaker?

The agent created a Steel session and started navigating. We watched from Steel's dashboard.

It found the right page on its own. Explored the form. Drafted a submission.

Watching it work

You don't have to watch. But it's useful sometimes.

OpenClaw pipes Steel's live session URL back into its responses. Open it and you see exactly what the browser is rendering as the agent works. When it misclicks or gets stuck in a modal, you see it. Step in, say something, the agent adjusts.

When you can't watch live, you replay. Steel keeps the full session: every navigation, every click, every retry.

OpenClaw is good at brute forcing

Works on regular web forms. The more bot-detection a site has, the slower it gets. Multi-step forms with dynamic fields or aggressive CAPTCHA checkpoints will eat sessions.

For sites where you're already logged in, don't start from scratch. steel profile import copies your Chrome session over and the agent picks up from there. The CFP form worked without any of that, but for Gmail, Slack, or any dashboard: use a profile.

Try it

curl -LsSf https://setup.steel.dev | sh
npx skills add https://github.com/steel-dev/cli --skill

curl -LsSf https://setup.steel.dev | sh
npx skills add https://github.com/steel-dev/cli --skill

curl -LsSf https://setup.steel.dev | sh
npx skills add https://github.com/steel-dev/cli --skill

curl -LsSf https://setup.steel.dev | sh
npx skills add https://github.com/steel-dev/cli --skill

Find a form you've been meaning to fill out. Give OpenClaw the URL and a one-sentence brief. Watch the session. Let it fight through the dropdowns. Report back.

Ready to

Build with Steel?

Ready to

Build with Steel?

Ready to

Build with Steel?

Ready to Build with Steel?

A better way to take your LLMs online.

© Steel · Inc. 2025.

All Systems Operational

Platform

Join the community