Back to skill
Skillv1.0.4
ClawScan security
MiniMax Token Used Query · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 13, 2026, 3:02 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill does what it claims (automates a local browser to read MiniMax usage) but includes sensitive behaviors—saving plaintext credentials to a workspace file and operating on the Default browser profile—that increase risk and deserve user review.
- Guidance
- This skill does what it says — it automates your local browser to log in and scrape MiniMax usage — but it stores credentials in plaintext in ~/.openclaw/workspace/memory/minimax-login.txt and uses your Chrome 'Default' profile (which may expose other logged-in sessions). Before installing: (1) inspect or run the scripts locally to confirm behavior; (2) consider creating and using a dedicated browser profile for this skill instead of 'Default'; (3) avoid storing passwords — remove or rotate the memory file after use, or modify the script to only store ephemeral tokens if possible; (4) verify that the 'browser-use' CLI is a trusted tool on your machine; (5) be aware the Node quick script contains a syntax bug and may not work as-is. If you are uncomfortable storing credentials or giving the skill access to your default browser profile, do not install or modify the scripts to eliminate persistent plaintext storage.
- Findings
[NONE] expected: No automated regex-based scan findings were reported. Manual review found no network exfiltration endpoints in the scripts; they rely on the browser to contact minimaxi.com. [JS_SYNTAX_ERROR] unexpected: query-quick.js contains a malformed line ('execSyncfunction run(command) {') which is a bug. This is not expected for a working quick-query script and may cause runtime failure.
Review Dimensions
- Purpose & Capability
- okName/description match implementation: scripts automate a local Chrome session (via browser-use) to open the MiniMax coding plan page and scrape token usage. No unrelated cloud credentials, binaries, or external services are requested.
- Instruction Scope
- concernSKILL.md and scripts instruct the agent to open the user's local Chrome profile, perform login flows, scrape DOM text, and save login credentials to a local memory file (~/.openclaw/workspace/memory/minimax-login.txt). Saving credentials and using the Default profile expands scope beyond read-only querying and may expose other logged-in accounts or data in that profile.
- Install Mechanism
- okNo install spec or remote downloads; this is instruction-only plus included scripts. No remote code fetches or archive extraction were found in the provided files.
- Credentials
- concernThe skill requests no environment variables, which is appropriate, but it writes/reads a plaintext credential file inside the user's workspace and operates on the browser 'Default' profile. Persisting passwords in plaintext and using the main browser profile are disproportionate from a least-privilege perspective and increase exposure.
- Persistence & Privilege
- notealways is false and the skill does not attempt to modify other skills or global agent settings. It does persist credentials to a memory file under the user's workspace (and sets chmod 600), which is normal for convenience but is persistent sensitive state that the user should be aware of.
