opencli

WarnAudited by ClawScan on May 18, 2026.

Overview

This skill is useful but needs review because it can use your logged-in Chrome sessions to read private account data, post or modify social content, and fall back to broad browser automation.

Review carefully before installing. Use a separate Chrome profile, log out of accounts you do not want exposed, require explicit confirmation for posts, likes, deletes, and private-data reads, inspect any generated ~/.opencli CLIs, and verify or pin the opencli, Playwright MCP, and Chrome extension sources.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If invoked, the agent may read personal account data or act as you on services where Chrome is logged in.

Why it was flagged

The skill's core authority is the user's existing logged-in browser session, and the documented commands include both account-specific reads and public account actions.

Skill content
reusing Chrome's login state. Zero credentials needed ... opencli twitter post --text "Hello from CLI!" ... opencli twitter bookmarks -f json
Recommendation

Use a separate Chrome profile or dedicated accounts, stay logged out of services you do not want exposed, and require explicit approval for every private read or account-changing action.

What this means

The agent could navigate, snapshot, click, type, or scroll inside logged-in sites beyond the safer documented command set.

Why it was flagged

The fallback workflow encourages automatic use of general browser-control tools when scoped opencli commands are unavailable.

Skill content
永远不说"不支持",先尝试 opencli,失败或无命令时自动切换 Playwright ... browser_click / browser_type / browser_scroll
Recommendation

Require explicit user approval before switching to Playwright, especially for logged-in pages, private messages, forms, posting, liking, deleting, or account settings.

What this means

Generated site commands may persist and run later against logged-in pages, and a poorly scoped script could collect or act on more page data than intended.

Why it was flagged

The skill instructs the agent to generate persistent opencli definitions containing executable browser JavaScript for unsupported sites.

Skill content
opencli generate <url> ... 手动创建 YAML ... 写入 ~/.opencli/clis/<site>/top.yaml ... evaluate: | (async () => { ... return results; })()
Recommendation

Ask before creating custom CLIs, inspect generated YAML before use, keep it limited to non-sensitive pages, and delete ~/.opencli/clis entries that are no longer needed.

What this means

Those external tools will have significant browser/session access, so their provenance and updates matter.

Why it was flagged

The reviewed package is instruction-only, but setup relies on external packages and a latest-version MCP server that are not included in the scanned artifacts.

Skill content
npm install -g @jackwener/opencli ... claude mcp add playwright --scope user -- npx @playwright/mcp@latest
Recommendation

Install only from trusted sources, consider pinning package versions, and review the opencli, Playwright MCP, and Chrome extension permissions before use.

What this means

Content from logged-in web pages may flow through the local MCP/browser bridge into the agent's context.

Why it was flagged

The skill relies on a browser extension and MCP bridge to expose logged-in browser pages to the agent.

Skill content
- Chrome browser open with target site logged in
- Playwright MCP Bridge extension installed in Chrome
Recommendation

Use trusted MCP and extension components, disable the bridge when not needed, and avoid opening sensitive accounts in the controlled Chrome profile.