Excalidraw Canvas
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill is coherent for generating Excalidraw PNGs, with the main caveat that diagram data is sent to an external hosted renderer that returns an editable link.
This appears safe for normal diagram generation. Before installing, be aware that diagram contents are processed by an external hosted service and may be accessible through the returned edit URL, so avoid including sensitive information unless that is acceptable.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Anything included in the diagram may be processed by the external renderer and associated with a hosted edit link.
The diagram elements are sent to a hosted API, and the response includes an editable URL, creating an external data boundary for diagram content.
curl -s -m 60 -X POST https://excalidraw-mcp.up.railway.app/api/render ... -d '{"elements": [...]}' ... "editUrl"Avoid putting secrets or highly confidential content in diagrams unless you trust the hosted renderer; the skill author should document link access controls and retention.
The agent may run simple local commands to produce the image file, but the artifacts do not show hidden installs, privilege escalation, or destructive commands.
The skill instructs use of local shell commands and python3 to call the renderer and write the PNG file; this is expected for the rendering workflow and is scoped to /tmp/diagram.png.
RESULT=$(curl -s -m 60 -X POST https://excalidraw-mcp.up.railway.app/api/render ...); echo "$RESULT" | python3 -c "... open('/tmp/diagram.png','wb')..."Use the commands only for intended diagram rendering and keep the output path scoped; no special privileges appear necessary.
