Klientenportal

PassAudited by ClawScan on May 10, 2026.

Overview

This appears to be a legitimate Klientenportal automation skill, but it uses your tax-portal login, uploads/downloads accounting documents, and keeps a local browser session unless you log out.

Before installing, make sure you are comfortable giving this skill access to your Klientenportal account and accounting documents. Store credentials securely, review uploads before running them, download sensitive files only to appropriate locations, and run logout after finishing so the local browser session is cleared.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone using the skill is delegating access to a sensitive accounting portal account.

Why it was flagged

The skill uses the configured Klientenportal user ID and password to log into the tax/accounting portal.

Skill content
page.locator('input[type="text"]').first.fill(config["user_id"])
page.locator('input[type="password"]').first.fill(config["password"])
Recommendation

Use a dedicated account if available, keep the config file and environment variables private, and review portal activity if unexpected uploads or downloads occur.

What this means

A mistaken command or broad file pattern could upload the wrong accounting documents.

Why it was flagged

The skill can upload selected receipt or invoice files, including wildcard selections, to a specific accounting category in the external portal.

Skill content
python3 {baseDir}/scripts/klientenportal.py upload -f invoice.pdf --belegkreis KA
python3 {baseDir}/scripts/klientenportal.py upload -f *.xml --belegkreis SP
Recommendation

Confirm file paths and Belegkreis categories before upload, and avoid broad wildcards unless you have reviewed the matching files.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Portal session cookies may remain on disk after a task until logout or cleanup.

Why it was flagged

The browser profile is stored persistently under the skill's workspace directory, which can retain session state between runs.

Skill content
PROFILE_DIR = CONFIG_DIR / ".pw-profile"
...
return pw.chromium.launch_persistent_context(
        user_data_dir=str(PROFILE_DIR),
Recommendation

Run the documented logout command after use and protect or remove the local profile directory if the workspace is shared.

What this means

The skill depends on external automation tooling that should come from trusted package sources.

Why it was flagged

Setup instructs users to install Playwright and a browser runtime from external package/download sources.

Skill content
pip install playwright
playwright install chromium
Recommendation

Install from trusted package indexes or a controlled environment, and consider pinning Playwright versions for reproducible deployments.