Klientenportal

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: klientenportal Version: 1.5.1 The OpenClaw AgentSkills bundle for RZL Klientenportal automation is classified as benign. The skill's purpose is clearly defined as interacting with `klientenportal.at` for document exchange. The Python script (`scripts/klientenportal.py`) demonstrates robust security practices, including output path sandboxing to restrict file writes to the workspace or `/tmp`, input file path validation to prevent uploads from arbitrary locations, and filename sanitization to mitigate path traversal. It also hardens permissions on configuration and profile directories and explicitly clears browser sessions. There is no evidence of data exfiltration to unauthorized endpoints, arbitrary command execution, persistence mechanisms, or prompt injection attempts in the `SKILL.md`.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone using the skill is delegating access to a sensitive accounting portal account.

Why it was flagged

The skill uses the configured Klientenportal user ID and password to log into the tax/accounting portal.

Skill content
page.locator('input[type="text"]').first.fill(config["user_id"])
page.locator('input[type="password"]').first.fill(config["password"])
Recommendation

Use a dedicated account if available, keep the config file and environment variables private, and review portal activity if unexpected uploads or downloads occur.

What this means

A mistaken command or broad file pattern could upload the wrong accounting documents.

Why it was flagged

The skill can upload selected receipt or invoice files, including wildcard selections, to a specific accounting category in the external portal.

Skill content
python3 {baseDir}/scripts/klientenportal.py upload -f invoice.pdf --belegkreis KA
python3 {baseDir}/scripts/klientenportal.py upload -f *.xml --belegkreis SP
Recommendation

Confirm file paths and Belegkreis categories before upload, and avoid broad wildcards unless you have reviewed the matching files.

NoteHigh Confidence
ASI10: Rogue Agents
What this means

Portal session cookies may remain on disk after a task until logout or cleanup.

Why it was flagged

The browser profile is stored persistently under the skill's workspace directory, which can retain session state between runs.

Skill content
PROFILE_DIR = CONFIG_DIR / ".pw-profile"
...
return pw.chromium.launch_persistent_context(
        user_data_dir=str(PROFILE_DIR),
Recommendation

Run the documented logout command after use and protect or remove the local profile directory if the workspace is shared.

What this means

The skill depends on external automation tooling that should come from trusted package sources.

Why it was flagged

Setup instructs users to install Playwright and a browser runtime from external package/download sources.

Skill content
pip install playwright
playwright install chromium
Recommendation

Install from trusted package indexes or a controlled environment, and consider pinning Playwright versions for reproducible deployments.