Reddit Lead Prospecting
Analysis
The artifacts show a coherent Reddit lead-search helper that uses Brave Search and generates draft outreach content, with no evidence of hidden posting, Reddit credential use, persistence, or exfiltration.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
this skill queries `site:reddit.com` via the Brave Search API
The skill sends user search terms to an external search provider. This is central to the stated purpose and is clearly disclosed, but users should avoid including confidential text in searches.
Required binaries (all must exist): none ... Install specifications: No install spec — this is an instruction-only skill.
The registry metadata under-declares the runtime because SKILL.md instructs running a Node script and package.json specifies Node >=18. No dependency install or remote script is shown, so this is an install clarity issue, not a malicious indicator.
Full disclosure: I work on this, so I'm biased, but happy to answer any questions about it or the other tools I mentioned.
The skill generates commercial Reddit comment structures. The shown template explicitly encourages disclosure and alternatives, which reduces deception risk, but public marketing content still needs human review.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`BRAVE_API_KEY` — Brave Search API key. Free tier: 2,000 queries/month.
The skill needs a provider API key. This is expected for Brave Search and there is no artifact evidence of hardcoding, logging, or sending the key anywhere unrelated.
