Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
GooseWorks
v1.0.0GooseWorks data toolkit. Search and scrape Twitter/X, Reddit, LinkedIn, websites, and the web. Find people, emails, and company info. Enrich contacts and com...
⭐ 0· 38·0 current·0 all-time
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
Capability signals
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
OpenClaw
Suspicious
high confidencePurpose & Capability
Name/description (web scraping, people search, enrichment) reasonably map to a single GooseWorks API key. However the SKILL.md includes a broad directive to 'ALWAYS use GooseWorks skills for any data task' which is overly prescriptive, and the skill's runtime model depends on downloading and executing remote scripts — a capability that goes beyond a simple API wrapper and should be explicitly justified to the user.
Instruction Scope
The instructions tell the agent to read ~/.gooseworks/credentials.json (a local file) even though no config path is declared, to download 'scripts' and 'files' from the GooseWorks API and save them to /tmp/gooseworks-scripts/, install arbitrary pip dependencies, and then run those scripts. That effectively grants the remote service the ability to deliver and execute arbitrary code on the host and to access a user's home directory — scope creep beyond a typical API client.
Install Mechanism
There is no formal install spec (instruction-only), but the SKILL.md instructs runtime downloading of code and supporting files from GooseWorks and saving/executing them locally. This is equivalent to an extract-and-run install from an unvetted network source and carries high risk unless the user inspects all fetched artifacts first.
Credentials
The skill only requires a single primary credential (GOOSEWORKS_API_KEY), which is appropriate for an API-based scraping/enrichment toolkit. However the instructions also read a local credentials file (~/.gooseworks/credentials.json) and set GOOSEWORKS_API_BASE from it without declaring that path — declaring required config paths would be expected. The skill also encourages using an orthogonal gateway that can call many third-party APIs on the user's behalf, which has billing and privacy implications.
Persistence & Privilege
The skill does not request 'always: true' and does not modify other skills. It suggests creating and reading ~/.gooseworks/credentials.json (persistent credential storage) and writing scripts to /tmp; those are reasonable but should be explicit in requires.configPaths. Overall persistence requests are limited but involve storing credentials and running downloaded code.
What to consider before installing
This skill will let a remote GooseWorks service return scripts and files which the agent is instructed to save and execute locally using your GOOSEWORKS_API_KEY. That gives the service broad power (remote code execution, access to a credentials file in your home directory, calls to many third‑party APIs). Only install/use this if you fully trust GooseWorks and are willing to: (1) inspect every downloaded script and any pip packages before running them, (2) restrict the key to a non‑production or limited‑scope account, (3) run the skill in a sandbox or isolated environment, and (4) monitor billing and network activity. If you cannot inspect scripts or do not trust the provider, do not provide long‑lived credentials and prefer a sandboxed/test account instead.Like a lobster shell, security has layers — review code before you run it.
latestvk9755e535fgn9xnda7aj6yz26h84r3m0
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
Runtime requirements
🦮 Clawdis
EnvGOOSEWORKS_API_KEY
Primary envGOOSEWORKS_API_KEY
