Ads Manager Claw

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This skill matches an ads-management purpose, but it asks for powerful ad-account credentials and can change budgets or delete campaigns, so it needs careful review before use.

Install only if you are comfortable giving an agent access to paid advertising accounts. Use short-lived, least-privileged tokens, test on paused campaigns first, require explicit approval for every budget/status/delete action, and revoke credentials when finished.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

#
ASI03: Identity and Privilege Abuse
High
What this means

If a powerful token is shared, the agent or anyone with access to that token could change campaigns, budgets, or public ads in the connected account.

Why it was flagged

The skill directly asks the user to provide live ad-account credentials. That is expected for ad management, but these credentials can authorize spending and campaign changes, and the registry metadata does not declare a primary credential.

Skill content
"Please share your Ad Account ID and access token — only used for this session."
Recommendation

Use least-privileged, short-lived credentials where possible, prefer a secure OAuth or credential-vault flow over chat-pasted secrets, and revoke tokens immediately after use.

#
ASI02: Tool Misuse and Exploitation
Medium
What this means

The agent could treat a budget edit, pause, resume, or other account mutation as safe unless the workflow is tightened.

Why it was flagged

The instructions allow execution of ad-management actions but leave an ambiguous 'unless safe' exception. For paid advertising, even actions that seem routine can affect spend, reach, or account state.

Skill content
Before ANY action:
- Confirm with user (unless safe)
...
Always:
**Analyze → Diagnose → Recommend → Execute**
Recommendation

Require explicit user approval for every write action, show the exact account, campaign, budget, and status change first, and default to dry-run or paused creation.

#
ASI09: Human-Agent Trust Exploitation
Medium
What this means

A user may believe the credential risk ends with the chat session even though the token they generated may remain valid later.

Why it was flagged

The credential guide discusses long-lived and refresh credentials, which weakens the SKILL.md assurance that the access token is 'only used for this session' unless token lifetime, storage, and revocation are clearly explained.

Skill content
For a long-lived token (doesn't expire every hour) ... OAuth2 credentials (Client ID, Client Secret, Refresh Token)
Recommendation

Clearly explain token lifetimes, avoid requesting refresh/client secrets unless necessary, and include revocation steps for each platform.

#
ASI07: Insecure Inter-Agent Communication
Low
What this means

Customer identifiers could be shared with an advertising platform if the user asks for custom-audience targeting.

Why it was flagged

The reference includes user-directed customer-list upload to an ad provider. This is purpose-aligned for ad targeting, but it involves sensitive customer data even when hashed.

Skill content
Custom Audiences (from email list) ... Then upload hashed emails via: POST `/{audience_id}/users`
Recommendation

Only upload customer lists with proper consent, verify the destination ad account, and follow the ad platform's data-use policies.