Pmos Search Menu Skill
PassAudited by ClawScan on May 10, 2026.
Overview
No malicious behavior is evident; the skill does what it says, but it controls a logged-in PMOS browser session and runs local OpenClaw commands.
This skill is reasonable for guided PMOS menu navigation. Before installing, be comfortable with it controlling your logged-in PMOS browser session, avoid pasting anything except simple element refs into the Node script, and do not use the missing PowerShell path unless the maintainer supplies that file for review.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If someone pastes an unexpected value instead of a simple ref like e78, the local shell could run something other than the intended browser click.
The script asks the user for a browser element ref and interpolates it into a shell command used to click a menu item. This is purpose-aligned, but refs should be constrained to avoid accidental shell-command injection from malformed input.
rl.question(' 输入元素引用 (例如 e78,留空跳过): ', resolve); ... `openclaw browser act click --ref ${ref}`Only enter simple OpenClaw refs such as e78. Maintainers should validate refs/targetIds or use execFile/spawn with argument arrays instead of shell-interpolated strings.
The agent may view and click pages available to your PMOS account while you are logged in.
The skill explicitly requires a valid PMOS login and operates through the logged-in browser session. The artifacts do not show credential collection or storage, but the agent will act within the user's authenticated account context.
需要: 1. PMOS 网站的有效登录账号
Use only an account you are authorized to operate, monitor the browser during execution, and log out when finished if the session should not remain available.
Authenticated page text may be shown to the agent or terminal as part of navigation troubleshooting and previewing.
The script takes browser snapshots from the current PMOS page and prints a page-content preview. This is disclosed and central to navigation, but snapshots from a logged-in site may include non-public page contents.
runCommand(`openclaw browser snapshot --refs aria --compact${currentTabId ? ` --targetId ${currentTabId}` : ''}`);Avoid running this on pages containing data you do not want exposed to the agent context, and review snapshots before sharing logs.
The documented PowerShell command may fail or lead users to look for a script that is not included in the reviewed artifacts.
The package metadata references a PowerShell script, while the provided manifest includes only JS and Bash navigation scripts. This appears to be an incomplete or stale package reference rather than hidden execution.
"scripts": { "navigate": "./scripts/navigate-pmos.ps1" }Use the included JS/Bash scripts, or ask the maintainer to publish and review the missing PowerShell script before relying on it.
