PinchTab

WarnAudited by ClawScan on May 18, 2026.

Overview

PinchTab appears to be a legitimate browser-control plugin, but it can operate logged-in browser sessions and forwards OpenClaw session identifiers to its browser server, so it should be tightly scoped before use.

Install only if you need agent-driven browser automation. Keep the default isolated profile, set `allowedDomains`, use a trusted local PinchTab server, avoid the `user` profile for sensitive logged-in accounts, and enable evaluate/download/upload/network features only for narrowly scoped tasks.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could navigate pages, click, type, capture page contents, and—if policies are enabled—run page JavaScript, upload/download files, or inspect network traffic.

Why it was flagged

The primary tool exposes broad browser-control features. These are central to the plugin purpose and some are policy-gated, but they are high-impact if enabled or used on sensitive sites.

Skill content
"evaluate", "pdf", "download", "upload", "network", "health"
Recommendation

Keep evaluate, uploads, downloads, and network interception disabled unless needed, and set an allowedDomains list for sensitive workflows.

What this means

If the user profile is used, the agent may act inside already logged-in websites and could read or change account data through the browser.

Why it was flagged

Attaching to an existing browser session gives the agent access to logged-in accounts and cookies. The same configuration example also shows `allowedDomains: []`, meaning all domains are allowed by default.

Skill content
| `user` | Attach to existing browser session (cookies/logins preserved) |
Recommendation

Prefer the isolated `openclaw` profile, avoid the `user` profile for sensitive accounts, and configure domain allowlists and human approval for account-changing actions.

What this means

A configured or compromised PinchTab server could receive internal OpenClaw session identifiers that the user may not expect to leave the agent runtime.

Why it was flagged

The plugin forwards OpenClaw runtime session identifiers, including `sessionKey`, as HTTP headers to the configured PinchTab server. That boundary is sensitive, especially if `baseUrl` is not strictly local/trusted.

Skill content
if (context?.sessionKey) headers["X-OpenClaw-Session-Key"] = context.sessionKey;
Recommendation

Use a trusted local PinchTab server where possible, avoid pointing `baseUrl` at untrusted hosts, and consider removing or documenting transmission of session identifiers.

What this means

Later tool calls may reuse the previous tab context, which is convenient but can surprise users if tasks switch between websites or accounts.

Why it was flagged

The plugin keeps in-memory per-agent session state for up to an hour, including last-tab context, to support continuity across tool calls.

Skill content
const agentSessionMaxAgeMs = 60 * 60 * 1000; const agentSessions = new Map();
Recommendation

Disable `persistSessionTabs` when isolation between tasks is more important than continuity, or manually close/reset tabs between sensitive tasks.

What this means

A future container image update could change browser-server behavior without the user noticing.

Why it was flagged

The optional manual server setup uses an unpinned `latest` container tag, which can change over time.

Skill content
docker run -d -p 9867:9867 ghcr.io/pinchtab/pinchtab:latest
Recommendation

Pin the PinchTab server image to a specific version or digest for production or sensitive use.