raiffeisen-elba

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill is mostly transparent about banking automation, but it handles bank credentials/session tokens and includes an under-documented bulk bank-document download helper, so it needs careful review before use.

Treat this as a high-sensitivity banking automation skill, not a general utility. Audit the code before using real credentials, consider removing the document-download helpers if you do not need them, keep config.json private, approve only expected pushTAN prompts, and always run logout when finished.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user expecting account balances and transactions may not realize the skill also includes code capable of retrieving many bank documents or statements using the same login session.

Why it was flagged

This included executable helper can use the authenticated banking session to bulk download bank documents. The main SKILL.md command list covers login, accounts, transactions, portfolio, and logout, so document download is a sensitive capability that is not clearly disclosed in the primary usage instructions.

Skill content
Download all collected documents via API ... print(f"\n[main] Starting download of {len(documents)} documents...")
Recommendation

Document this capability prominently in SKILL.md, require explicit user confirmation and date/account scope for document downloads, or remove the helper scripts if they are not intended to be part of the skill.

What this means

After you approve 2FA, the automation can reuse the authenticated session token to retrieve bank data without asking for the PIN again for each operation.

Why it was flagged

The skill intentionally uses browser automation to capture a bank bearer token for internal API calls. This is disclosed and purpose-aligned, but it is a powerful session-handling pattern.

Skill content
Fallback: If not found in storage, the skill uses Playwright's page.route() to observe outgoing API requests within the same browser context and capture the Authorization: Bearer ... header.
Recommendation

Run it only in a trusted local environment, approve pushTAN only for actions you initiated, and avoid using real credentials unless you are comfortable with this token-handling approach.

What this means

If logout is not run, local browser cookies/session state and a cached token may remain on disk and could allow later access to bank data from the same environment.

Why it was flagged

Sensitive session material is persisted locally between commands. The artifacts describe restrictive permissions and logout cleanup, but the data remains available until cleanup occurs.

Skill content
Bearer Token | .pw-profile/token.json | 0600 | Ephemeral (minutes); deleted on logout ... Browser Session | .pw-profile/ | 0700 | Ephemeral; deleted on logout
Recommendation

Always run the logout command after use, keep the workspace private, and consider deleting .pw-profile manually if any command fails before logout.

What this means

You will install current versions of third-party packages and a browser runtime, which can change over time.

Why it was flagged

The setup uses user-run package and browser installation commands without pinned versions or a lockfile. This is normal for a Playwright-based skill, but it depends on external package provenance at install time.

Skill content
pip3 install requests playwright ... python3 -m playwright install chromium
Recommendation

Use a virtual environment, pin known-good package versions where possible, and install from trusted package indexes.