Back to skill
Skillv2.6.0

ClawScan security

Hookaido Webhook Integration · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignApr 20, 2026, 10:20 PM
Verdict
benign
Confidence
high
Model
gpt-5-mini
Summary
The skill is internally consistent: it documents and installs the hookaido CLI, requires the pull/ingress secrets you’d expect, and its instructions and installer match the stated webhook/queue management purpose.
Guidance
This skill appears to do what it says: install and operate the open-source hookaido CLI. Before installing, review the Hookaidofile and any 'deliver exec' entries (they can run local scripts with webhook payloads). Prefer the Docker sandbox if you’re unsure about installing a host binary. The included installer downloads from GitHub releases and verifies pinned SHA256 checksums — verify those checksums yourself if you need extra assurance. Only provide HOOKAIDO_PULL_TOKEN and ingress secrets to trusted deployments, and avoid enabling exec delivery or broad mutation/operate roles unless you trust the configured scripts and operators.

Review Dimensions

Purpose & Capability
okName/description, required binary (hookaido), required env vars (HOOKAIDO_PULL_TOKEN, HOOKAIDO_INGRESS_SECRET), CLI commands, and install options all align with operating a Hookaido webhook ingress/queue/delivery tool.
Instruction Scope
noteSKILL.md instructs the agent to edit/validate/run Hookaidofile, run the hookaido CLI, and inspect local state (DB, backlog, DLQ). It also documents 'deliver exec' (subprocess delivery) and examples that reference optional secrets (GITHUB_WEBHOOK_SECRET, STRIPE_SIGNING_SECRET, HOOKAIDO_POSTGRES_DSN). These are expected for webhook delivery tooling but warrant caution: enabling exec delivery or applying unreviewed Hookaidofile contents can run local scripts or mutate queued items.
Install Mechanism
noteInstaller options include go install (pulls Go module) and direct downloads from GitHub releases. Downloads are pinned to v2.6.0 and the included install script verifies SHA256 checksums — this is acceptable and lower-risk than arbitrary URLs, but installing binaries or running go install will write executables to disk and fetch upstream code.
Credentials
okThe two required env vars (HOOKAIDO_PULL_TOKEN primary, HOOKAIDO_INGRESS_SECRET) are proportional to the skill’s purposes (pull auth and HMAC ingress). The docs reference additional optional secrets (provider webhook secrets, POSTGRES DSN) for optional features; these are not declared as required and are reasonable to be optional.
Persistence & Privilege
okalways:false and no indication the skill force-enables itself or alters other skills. The installer writes a binary to typical per-user locations (~/.local/bin or ~/.openclaw/tools) which is normal for a CLI tool. The docs include examples for adding an MCP plugin to a user-specific .claude/settings.json but do not perform that change automatically.