Back to skill
Skillv2.6.0
ClawScan security
Hookaido Webhook Integration · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignApr 20, 2026, 10:20 PM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill is internally consistent: it documents and installs the hookaido CLI, requires the pull/ingress secrets you’d expect, and its instructions and installer match the stated webhook/queue management purpose.
- Guidance
- This skill appears to do what it says: install and operate the open-source hookaido CLI. Before installing, review the Hookaidofile and any 'deliver exec' entries (they can run local scripts with webhook payloads). Prefer the Docker sandbox if you’re unsure about installing a host binary. The included installer downloads from GitHub releases and verifies pinned SHA256 checksums — verify those checksums yourself if you need extra assurance. Only provide HOOKAIDO_PULL_TOKEN and ingress secrets to trusted deployments, and avoid enabling exec delivery or broad mutation/operate roles unless you trust the configured scripts and operators.
Review Dimensions
- Purpose & Capability
- okName/description, required binary (hookaido), required env vars (HOOKAIDO_PULL_TOKEN, HOOKAIDO_INGRESS_SECRET), CLI commands, and install options all align with operating a Hookaido webhook ingress/queue/delivery tool.
- Instruction Scope
- noteSKILL.md instructs the agent to edit/validate/run Hookaidofile, run the hookaido CLI, and inspect local state (DB, backlog, DLQ). It also documents 'deliver exec' (subprocess delivery) and examples that reference optional secrets (GITHUB_WEBHOOK_SECRET, STRIPE_SIGNING_SECRET, HOOKAIDO_POSTGRES_DSN). These are expected for webhook delivery tooling but warrant caution: enabling exec delivery or applying unreviewed Hookaidofile contents can run local scripts or mutate queued items.
- Install Mechanism
- noteInstaller options include go install (pulls Go module) and direct downloads from GitHub releases. Downloads are pinned to v2.6.0 and the included install script verifies SHA256 checksums — this is acceptable and lower-risk than arbitrary URLs, but installing binaries or running go install will write executables to disk and fetch upstream code.
- Credentials
- okThe two required env vars (HOOKAIDO_PULL_TOKEN primary, HOOKAIDO_INGRESS_SECRET) are proportional to the skill’s purposes (pull auth and HMAC ingress). The docs reference additional optional secrets (provider webhook secrets, POSTGRES DSN) for optional features; these are not declared as required and are reasonable to be optional.
- Persistence & Privilege
- okalways:false and no indication the skill force-enables itself or alters other skills. The installer writes a binary to typical per-user locations (~/.local/bin or ~/.openclaw/tools) which is normal for a CLI tool. The docs include examples for adding an MCP plugin to a user-specific .claude/settings.json but do not perform that change automatically.
