Workflow Cache

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This cloud cache skill can automatically share task and browser context with a server and replay server-supplied browser workflows, so it needs careful review before installation.

Install only if you are comfortable with a cloud service receiving task and browsing-context details and replaying cached workflows in your browser. Before using it on sensitive accounts, verify the publisher and endpoint, disable `auto_contribute` if possible, require manual approval for workflow replay, and avoid using it with private URLs, financial actions, or admin sessions.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A server-supplied cached workflow could click, type, submit, delete, buy, or otherwise act in the user's active browser session without the user reviewing the exact steps first.

Why it was flagged

On each intent, the skill asks the cloud for a workflow and executes the returned workflow after validation, but the artifacts do not show user confirmation, an action allowlist, or domain scoping before execution.

Skill content
matchResult = await client.match({ intent: parsed.normalized, url, dom_skeleton_hash: domHash, node_id: nodeId }); ... execResult = await lobster.execute(macro.lobster_workflow);
Recommendation

Require explicit user approval before replaying any cloud workflow, show the workflow steps, restrict high-risk actions and domains, and provide an easy disable/rollback path.

What this means

Private task descriptions, sensitive URLs or query parameters, browsing context, and workflow details may be sent to the provider automatically.

Why it was flagged

Successful sessions are uploaded with raw intent, current URL, DOM hash, node ID, session ID, and workflow data; matching also sends intent, URL, DOM hash, and node ID to the cloud.

Skill content
await client.contribute({ node_id: nodeId, intent, url, dom_skeleton_hash: domHash, lobster_workflow: workflow, session_id: sessionId });
Recommendation

Make cloud sharing opt-in, strip or minimize URLs and identifiers, document retention and access controls, and let users review exactly what will be uploaded.

What this means

A bad or poisoned cached workflow could be reused later by the user or other agents and cause incorrect or unsafe browser actions.

Why it was flagged

The skill creates and reuses a persistent shared workflow cache across agents; the artifacts do not show strong provenance, signatures, quarantine, or trust boundaries for contributed/retrieved workflows.

Skill content
A crowdsourced Lobster workflow registry that caches successful automation patterns. ... `on_session_complete` → Compile and contribute successful sessions
Recommendation

Use signed workflows, contributor reputation, per-domain isolation, human review for new macros, and safe rollback/reporting before allowing shared workflows to execute.

What this means

Users may trust the privacy claims and enable the skill on sensitive sites even though some sensitive context can still leave the device.

Why it was flagged

These privacy claims are stronger than the code supports: the implementation uploads raw intent, URL, node/session identifiers, and workflows, while sanitization is limited to regex and field-name handling for action arguments.

Skill content
- All PII stays local
- Only workflow patterns are shared
- Full sanitization before upload
Recommendation

Revise the privacy text to match actual uploads, sanitize intent and URLs, disclose remaining data types, and make contribution/upload behavior opt-in.

What this means

Users may have difficulty verifying which publisher, package, or cloud endpoint they are trusting.

Why it was flagged

The SKILL.md identity, endpoint, and install command do not consistently match the evaluated registry/skill.json identity and endpoint, creating provenance ambiguity for a cloud-connected automation skill.

Skill content
name: clawmind ... `cloud_endpoint` ... `https://api.clawmind.dev` ... `npx clawhub install ainclaw-cloudmind`
Recommendation

Align registry metadata, SKILL.md, package.json, skill.json, version numbers, install instructions, and endpoint ownership before distribution.

What this means

The skill can act through the user's logged-in browser sessions and inspect prior session actions for workflow compilation.

Why it was flagged

These permissions are expected for a workflow cache, but they are sensitive because they allow browser automation, reading session history, and external network communication.

Skill content
"permissions": [ "browser", "sessions_history", "network" ]
Recommendation

Install only if you trust the publisher and cloud endpoint; consider using it only in a separate browser profile or low-risk workspace.