Drug Safety Review

WarnAudited by ClawScan on May 18, 2026.

Overview

This skill makes strong medical-safety claims that are not supported by the included implementation, and it also includes an unrelated background self-evolution daemon.

Do not use this as a real clinical safety authority without independent verification. If you test it, treat it as a limited demo, avoid real patient identifiers, be careful with billing API keys, and do not start the auto-evolution daemon.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user could incorrectly rely on the tool as comprehensive and miss serious medication risks that are not represented in the small included database.

Why it was flagged

The documentation markets the tool as a comprehensive, evidence-based medical safety system, but the visible implementation exposes only a small hard-coded set of drugs. In a healthcare context, this mismatch can create unsafe user trust.

Skill content
README.md: "20,000+ FDA-approved medications" and "200,000+ documented interactions"; scripts/safety_review.py: "DRUG_INFO = { 'warfarin': ..., 'metformin': ..., 'amoxicillin': ..., 'lisinopril': ..., 'simvastatin': ..., 'aspirin': ... }"
Recommendation

Treat this as a limited demo unless the publisher provides the claimed database, validation evidence, and accurate documentation; verify all outputs against authoritative clinical sources.

What this means

If launched, the daemon would keep running in the background and repeatedly execute code outside a single medication-review request.

Why it was flagged

The package includes a long-running auto-evolution loop and changelog language saying autonomous evolution/version upgrades are active, which is not aligned with a user-invoked medication review skill. The supplied install spec does not show it being auto-started, but the capability is present.

Skill content
auto-evolve-daemon.sh: "while true; do ... python3 scripts/self_evolve.py ... sleep 1800"; CHANGELOG.md: "自主进化系统激活" and "自动版本升级"
Recommendation

Do not run the daemon unless it is clearly documented, opt-in, stoppable, and scoped; the publisher should remove or explicitly disable self-evolution behavior for this skill.

What this means

If a user supplies an email, patient identifier, or other sensitive ID, it may remain in a local file despite the documentation implying it is hashed.

Why it was flagged

The documentation says user IDs are hashed, but the code stores the raw user_id as a JSON key in persistent local trial data.

Skill content
FAQ.md: "User ID (hashed)"; scripts/safety_review.py: "data[user_id] = {'used_calls': 0, 'first_use': ...}" and "json.dump(data, f, ensure_ascii=False, indent=2)"
Recommendation

Use a non-identifying random user ID, and the publisher should hash or pseudonymize stored identifiers and update the privacy documentation to match the code.

What this means

Users may misunderstand what credentials are needed or which key is being sent to the billing provider.

Why it was flagged

Billing credentials are purpose-aligned and disclosed in documentation, but the registry does not declare them and the documented variable names differ from the code.

Skill content
metadata: "Required env vars: none" and "Primary credential: none"; README.md: "SKILL_BILLING_API_KEY" / "SKILL_ID"; scripts/safety_review.py: "API_KEY = os.environ.get('SKILLPAY_API_KEY', '')" and "headers = {'X-API-Key': api_key, ...}"
Recommendation

Verify the exact billing environment variables before use, provide only a least-privilege billing key, and ask the publisher to align registry metadata, docs, and code.