LinkedIn Follow-up

AdvisoryAudited by Static analysis on Apr 30, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may act through your Google and LinkedIn accounts, including reading private messages, updating spreadsheets, and sending LinkedIn messages as you.

Why it was flagged

The skill uses Google authorization tokens and an authenticated LinkedIn browser session, while the supplied registry metadata declares no primary credential or required config path.

Skill content
`gog auth` — Run `gog auth list`... `Browser` — Open the openclaw browser profile and confirm LinkedIn is logged in.
Recommendation

Use a dedicated browser profile and least-privileged Google Sheet, confirm the Sheet ID is yours, and require explicit approval before every send or account mutation.

What this means

A wrong draft, wrong recipient, or accidental batch operation could send real messages under your LinkedIn identity.

Why it was flagged

The browser workflow can directly click LinkedIn’s real Send button from the logged-in profile. This matches the skill purpose, but it is an irreversible external account action.

Skill content
### 4d. Send ... if (btn) { btn.click(); return 'sent'; }
Recommendation

Keep the approval step mandatory, verify screenshots and recipients before sending, and avoid unattended or bulk sends.

What this means

Using stealth-like LinkedIn automation may put the user’s account, reputation, or compliance posture at risk.

Why it was flagged

The workflow explicitly includes anti-detection behavior for LinkedIn automation without explaining platform, account, or compliance risks to the user.

Skill content
**Always go to feed first** (anti-detection): `https://www.linkedin.com/feed/`
Recommendation

Remove anti-detection guidance, disclose platform-risk tradeoffs clearly, and prefer official or policy-compliant integration methods.

What this means

Private conversation history may be retained and reused beyond the current task, and anyone with sheet access could see it.

Why it was flagged

The skill stores LinkedIn conversation content as persistent CRM context for later use, which can expose private messages in the sheet and allow untrusted message text to influence future drafts.

Skill content
Append new entries to the existing log in col O... Keep the format consistent so the follow-up skill can parse it in future sessions.
Recommendation

Restrict sheet access, confirm the destination Sheet ID, redact sensitive content, set a retention policy, and treat stored conversation text as untrusted input.