Back to skill
Skillv1.1.0
ClawScan security
Placed Career Tools · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignMar 21, 2026, 10:01 PM
- Verdict
- benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- The skill's requests and runtime instructions match its stated purpose (calling the Placed API for resume/job, cover letters, salary, and company research); no unexplained credentials, installs, or hidden endpoints were found — but its suggested method for storing the API key (sourcing a plaintext export file) has modest security trade-offs you should consider.
- Guidance
- This skill appears to do what it says (call the Placed API) and asks only for a Placed API key. Before using it: (1) verify the homepage/endpoint (https://placed.exidian.tech) is the real service you trust, (2) prefer storing API keys in a secure store or OS keychain rather than plaintext files; if you use the suggested ~/.config/placed/credentials file, set restrictive file permissions (chmod 600) and avoid storing other secrets there, (3) be aware that 'source' will execute anything in that file — review it before sourcing, (4) do not paste your API key into public chat or logs, and (5) inspect the token's scope and rotate/revoke it if you stop using the skill. If you want stronger safety, avoid persisting the key and enter it only per-session, or manually create the credentials file with appropriate permissions instead of allowing the skill to overwrite it.
Review Dimensions
- Purpose & Capability
- okName/description describe career tools and all declared actions (match resume, generate cover letters, salary data, company research). The SKILL.md only requires a Placed API key and shows curl calls to https://placed.exidian.tech/api/mcp — this is coherent and proportional to the stated functionality.
- Instruction Scope
- noteInstructions are focused on API usage and provide a shell helper (placed_call). They instruct checking $PLACED_API_KEY, sourcing ~/.config/placed/credentials, prompting the user if missing, and then writing the key back to that file. That behavior is within scope but introduces two practical concerns: (1) sourcing a file executes shell code found there (typical for env files but could execute unexpected commands if the file is compromised), and (2) the instructions overwrite/create a plaintext file with an exported key, which may expose the secret if file permissions are permissive or the file already contained other content.
- Install Mechanism
- okThis is an instruction-only skill with no install spec and no code files — lowest disk/write risk. It relies on standard system tools (curl, bash, python3) already expected on many systems.
- Credentials
- okNo required environment variables or unrelated credentials are declared. The only secret involved is PLACED_API_KEY, which is appropriate for a service-specific API client. The skill does access $HOME/.config/placed/credentials (expected for storing that API key) but does not request other unrelated secrets.
- Persistence & Privilege
- okSkill is not always-enabled and can be invoked by the user. It does instruct saving the API key into a per-user config file, which is normal for API clients; it does not attempt to modify other skills or global agent settings.
