1Password Browser Login

WarnAudited by ClawScan on May 10, 2026.

Overview

Review needed: this is a coherent 1Password login helper, but it gives the agent broad password-manager and authenticated-browser authority that is not tightly scoped or declared in metadata.

Install or invoke this only if you are comfortable giving the agent controlled access to 1Password-backed logins. Use a least-privileged 1Password service account, limit it to the exact vault/items needed, confirm each vault/item/site/action before retrieval or browser automation, and avoid using it for financial, administrative, destructive, or public-posting actions without explicit extra approval.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could see 1Password item/vault inventory and retrieve credentials for any vaults the service account can access, then use those credentials to log in to third-party accounts.

Why it was flagged

The skill relies on a 1Password service-account token and instructs the agent to enumerate items/vaults and fetch item JSON containing username, password, and URL. This is aligned with the stated purpose, but it is high-impact and not tightly bounded to a specific vault or item.

Skill content
OP_SERVICE_ACCOUNT_TOKEN 已配置在 ~/.zshrc 中 ... op item list --format json ... op vault list --format json ... op item get "<ITEM_NAME>" --vault "<VAULT_NAME>" --format json
Recommendation

Use only with a least-privileged 1Password service account limited to specific vaults/items, require explicit user confirmation of the vault/item/site before retrieval, and declare the required credential and environment variable in metadata.

What this means

A mistaken or overly broad instruction could cause the agent to click or download content from a logged-in account and send files back to the user.

Why it was flagged

The skill uses browser automation with real credentials and combines it with file downloads and local exec-based file movement. These actions are expected for the stated purpose, but they can affect authenticated accounts or expose downloaded data if the user task is ambiguous.

Skill content
browser act kind=type ref=<密码框> text=<password> ... 下载文件 | browser act kind=click 触发下载 → exec 找到文件移到 workspace → MEDIA
Recommendation

Confirm the target site, account item, and exact post-login task before acting; require extra approval for purchases, deletes, settings changes, posts, or other high-impact authenticated actions.

What this means

Invoking the skill may run local shell-startup commands in addition to the intended 1Password CLI command.

Why it was flagged

The skill repeatedly sources the user's shell startup file before running 1Password CLI commands. This appears intended to load OP_SERVICE_ACCOUNT_TOKEN, but sourcing ~/.zshrc can execute arbitrary shell initialization commands.

Skill content
source ~/.zshrc 2>/dev/null && op whoami 2>&1
Recommendation

Prefer using a declared environment variable or a minimal credential-loading file rather than sourcing the full shell startup file; review ~/.zshrc before use.

What this means

Users may not see the credential and CLI requirements at install or review time unless they read SKILL.md carefully.

Why it was flagged

The registry metadata does not declare the 1Password CLI, OP_SERVICE_ACCOUNT_TOKEN, or a primary credential, even though SKILL.md requires them. This is an under-declared dependency/credential contract rather than hidden code execution.

Skill content
Required binaries (all must exist): none ... Required env vars: none ... Primary credential: none
Recommendation

Declare the required 1Password CLI binary, OP_SERVICE_ACCOUNT_TOKEN environment variable, and credential purpose in the skill metadata.