Back to skill
Skillv1.0.6

ClawScan security

Release · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

BenignMar 26, 2026, 5:14 AM
Verdict
benign
Confidence
medium
Model
gpt-5-mini
Summary
The skill's code and runtime instructions are consistent with an AI music-generation assistant: it stores a local token, talks to a single named API (skill-api.muse.top), and persists minimal state under ~/.muse — nothing in the package indicates it is doing unexpected remote exfiltration or deceptive behavior, but there are privacy-related design choices you should be aware of before installing.
Guidance
What to check before installing: - Understand the auth flow: the skill asks users to paste a JWT-like token into the chat to register/verify; avoid pasting long-lived or sensitive tokens into conversation logs if you want them private. Consider creating a dedicated/throwaway account or short-lived token for use with this skill. - Backend domain: all network calls go to https://skill-api.muse.top (consistent across scripts). If you plan to use this skill, review that domain and the hosted service's privacy policy before giving credentials. - Local device fingerprinting: the skill computes a device id from hostname/MAC/username, hashes it, stores it in ~/.muse/device_id, and sends the hash as X-Device-Id. This is used server-side for dedup/rate-limiting but is a fingerprinting vector — be aware if you need stronger anonymity. - Inspect files before running install: the included install.sh copies files into CLI skill directories and creates ~/.muse. You can open and audit scripts locally (they use only Python stdlib and urllib). Run install in a controlled environment or sandbox if you have doubts. - Removal: uninstall removes the skill directory but leaves ~/.muse (install.sh documents how to fully delete the data: rm -rf ~/.muse). - If you are privacy-sensitive, either avoid pasting tokens into chat, use a dedicated/limited account, or ask the skill author for an OAuth/browser-based flow that avoids pasting secrets into conversation logs. Overall: the package appears internally coherent with its stated purpose; the main concerns are privacy-sensitive choices (token pasted into chat, local device fingerprinting) rather than evidence of malicious behavior.

Review Dimensions

Purpose & Capability
okThe skill's declared purpose (dialog-driven music/song/BGM generation) matches the included scripts and SKILL.md: scripts call a single backend (https://skill-api.muse.top) for styles, lyrics, generation and polling. Persisting a token, task_id and device_id under ~/.muse is coherent with needing login and asynchronous task tracking. No unrelated cloud credentials, binaries, or system config paths are requested.
Instruction Scope
noteRuntime instructions direct the agent to cd into the skill directory and run the included Python scripts (member-info, generate, query). They also implement a flow that asks the user to paste a JWT-like token into the chat (detected by messages starting with 'eyJ') which the scripts then verify and save to ~/.muse/token. Running those scripts and reading/writing ~/.muse files is expected, but prompting users to paste an auth token into the chat means secrets will appear in the conversation stream unless the agent/user takes care to avoid logging — this is a privacy/usability concern rather than an incoherence.
Install Mechanism
okThere is an install.sh included which copies the provided files into a skill directory for supported CLIs; it does not download arbitrary code from unknown servers during install. README suggests a git clone URL, but the packaged install script as provided is local and performs file copies, Python checks, and basic migration. No extract-from-remote or URL-shortener downloads were found in the install script.
Credentials
concernThe skill requests no environment variables, but it does read system identifiers (hostname, MAC via uuid.getnode(), and login) to generate a persistent device id which it stores in ~/.muse/device_id and sends as X-Device-Id to the service. While the code hashes these values before storage/transmission, collecting MAC/username is privacy-sensitive and could be used to fingerprint a device. The workflow also asks users to paste an auth token into chat — exposing credentials in conversational logs is a real risk. These behaviors are explainable for the service but are proportionally sensitive and worth considering.
Persistence & Privilege
noteThe skill persists its own state (token, device_id, task_id) under ~/.muse and installs files into a skill directory; it does not request always:true, does not alter other skills, and does not require elevated system privileges. Persistent storage of an auth token and device fingerprint is expected for a logged-in service but increases the persistent blast radius if the local environment or skill files are compromised.