Back to skill
Skillv1.0.3

ClawScan security

Bailian Usage · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 18, 2026, 3:27 PM
Verdict
Benign
Confidence
high
Model
gpt-5-mini
Summary
The skill's code, instructions, and required files are consistent with its stated purpose (automatically logging into the Bailian console and extracting usage), and it does not request unrelated credentials or install arbitrary remote code.
Guidance
This skill appears to do exactly what it says: control the OpenClaw browser, read a local TOOLS.md for an Alibaba Bailian account, perform an automated login if needed, and extract usage info from the console page. Before installing or using it, consider: (1) Storing plaintext credentials in TOOLS.md is risky—store the file with restrictive filesystem permissions (chmod 600) or use a more secure credential mechanism if available. (2) Inspect the included query_browser.sh yourself; running it will cause the agent to type your password into a browser session—only run if you trust the host and OpenClaw runtime. (3) If you prefer not to store credentials, use the manual login fallback described in SKILL.md. (4) Verify that the OpenClaw 'browser' tool runs locally (not on an untrusted remote environment) so credentials are not exposed remotely.

Review Dimensions

Purpose & Capability
okName/description (query Bailian Coding Plan usage) match the included assets: SKILL.md, README, and query_browser.sh implement browser automation to open the Bailian console, check login, optionally login, and parse usage. No unrelated services, environment variables, or binaries are requested.
Instruction Scope
okSKILL.md and query_browser.sh limit actions to starting the openclaw browser tool, navigating to the Bailian console, optionally auto-filling credentials from a local TOOLS.md, and extracting DOM text with evaluate. The instructions do read a local file (~/.openclaw/workspace/TOOLS.md) for credentials, which is necessary for automated login and is declared in the package metadata.
Install Mechanism
okNo install spec is present (instruction-only skill with an included shell script). Nothing is downloaded from external URLs or extracted to disk during install; risk from the install mechanism is low.
Credentials
noteThe skill requests no environment variables and its only credential access is to a local TOOLS.md file holding an Alibaba account and password. This is proportionate for an automated login workflow, but storing plaintext credentials in a workspace file is inherently sensitive and increases risk if the host or workspace is compromised.
Persistence & Privilege
okThe skill is not declared always:true and does not modify other skills or system-wide configs. It reads and uses only its own workspace files and the browser profile; autonomous invocation is allowed by default (normal for skills).