Phishing Reporter
Report dangerous URLs to abuse/safety services via browser automation.
Reporting Strategy
Report to all applicable services in order:
- Google Safe Browsing (automated) — global reach, blocks in Chrome/Firefox/Safari
- NCSC Switzerland (semi-automated) — Swiss national cyber security centre
- Domain registrar (manual) — WHOIS lookup → abuse contact
Service 1: Google Safe Browsing (fully automated)
URL: https://safebrowsing.google.com/safebrowsing/report_phish/?hl=en
Workflow
Use the browser tool (profile: openclaw) to automate:
- Open the URL above
- Report Type: "This page is not safe" (default, leave as-is)
- Click "Threat Type" dropdown → select "Social Engineering" (for phishing)
- Click "Threat Category" dropdown → select best match (see references/services.md)
- Click URL textbox → type the phishing URL
- Click Additional details textbox → type description
- Click Submit
- Verify "Submission was successful" message
Notes
- Form uses custom dropdowns: click combobox → click option in listbox
- reCAPTCHA v3 runs invisibly — usually passes for headless browsers
- If CAPTCHA blocks: provide manual instructions as fallback
Service 2: NCSC Switzerland (chat wizard)
URL: https://www.report.ncsc.admin.ch/en/
The NCSC uses a multi-step chat wizard (not a simple form). Automate via browser:
Chat Path for Phishing Website Reports
- Open
https://www.report.ncsc.admin.ch/en/chat?path=406%3E407%3E1 - Click: "A website/a web service/a web platform"
- Click: "I would like to report a third-party website"
- Click: "The website displays fraudulent content"
- Click: "The website copies another known website" (for phishing clones)
- Continue through remaining steps (URL input, description, contact info)
- Submit the report
Direct Path URL (skips first steps)
https://www.report.ncsc.admin.ch/en/chat?path=406%3E407%3E1%3E128%3E132%3E133%3E314%3E130%3E135
Notes
- Wizard is stateful — each step reveals the next
- No CAPTCHA, but many clicks required
- Email alternative:
notification@ncsc.ch(include URL and description) - If automation fails, provide the direct path URL + instructions
Service 3: Domain Registrar (manual lookup)
- Run WHOIS lookup:
whois <domain>or usehttps://who.is/<domain> - Find "Registrar Abuse Contact Email"
- Send abuse email with phishing URL and description
Additional Details Template
Phishing site impersonating [BRAND]. Domain mimics [REAL SERVICE] customer service.
Designed to steal [banking credentials / login data / personal information].
Fallback: Manual Instructions
If automated submission fails, provide the user with:
- Direct links to each reporting form
- The URL to report
- Recommended categories/types
- Pre-written description text
Additional Reporting Services
See references/services.md for full list including Cloudflare, PhishTank, and APWG.