raiffeisen-elba
Analysis
This banking skill is mostly coherent, but it needs review because it stores bank login credentials, extracts/caches session tokens, and includes bulk bank-document download code beyond the main advertised commands.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"Download all collected documents via API" ... print(f"[main] Starting download of {len(documents)} documents...") ... result = download_document(doc, token, cookies, output_dir)The included code can bulk-download banking documents, while the main skill description and SKILL.md commands focus on login, accounts, transactions, portfolio, and logout. This broadens sensitive bank-data access beyond the advertised workflow.
Note that no passwords are stored... Create `<WORKSPACE_ROOT>/raiffeisen-elba/config.json`: { "elba_id": "YOUR_ELBA_ID", "pin": "YOUR_PIN" }The setup disclaimer downplays credential storage, but the same document instructs storing the banking PIN locally. That contradiction can cause users to underestimate the sensitivity of the configuration.
Session persistence — Browser profile persists between commands (until `logout`)
The persistence is disclosed and purpose-aligned for avoiding repeated logins, but it means the authenticated browser state can remain available to later commands if logout is not run.
pip3 install requests playwright ... python3 -m playwright install chromium
The dependency installation is manual and expected for Playwright automation, but versions are not pinned. For banking automation, dependency provenance deserves extra attention.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
You must create a `config.json` file containing your ELBA user ID and 5-digit PIN... the skill extracts the Bearer token... stored in a local cache file
This is direct handling of banking credentials and an authenticated session token. Even though the behavior is disclosed and aligned with the banking purpose, it grants high-impact account access and should be explicitly reviewed before installation.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
| Bearer Token | `.pw-profile/token.json` | `0600` | Ephemeral (minutes); deleted on `logout` | ... | Browser Session | `.pw-profile/` | `0700` | Ephemeral; deleted on `logout` |
Authenticated session state is intentionally persisted locally for reuse across commands. The files are permission-hardened and cleanup is documented, but this is still sensitive state.
