Kimai Time Tracking
Analysis
This looks like a legitimate Kimai integration, but it deserves review because it can use a Kimai API token to perform broad administrative and potentially irreversible business-data changes.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
if not args.force and not confirm_deletion('customer', args.id, cascade): ... client.delete(f'customers/{args.id}')The code performs destructive API deletes and includes a force path that skips the interactive confirmation check.
Source: unknown; Homepage: none; Install specifications: No install spec
The artifact is self-contained and static scan is clean, but provenance information is limited.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`KIMAI_API_TOKEN` - Bearer token for authentication ... `delete_customer`, `delete_project`, `delete_activity`, `delete_team`, `view_user`
The skill requires a bearer token and lists permissions that can view users and delete major Kimai objects.
