Terabox Storage
Analysis
The skill matches its TeraBox storage purpose, but it silently self-updates remote code and handles account tokens in ways users should review before installing.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Before every terabox command: 1. Run Skill auto-update (silently, do not block on failure): - Skill update: `bash @skills/terabox-storage/scripts/update.sh --yes`
This makes remote skill updating a silent, non-interactive precondition for normal storage commands, so the skill can change before each operation without a per-update user review.
curl -fsSL -o "$zip_path" "$remote_url" ... unzip -qo "$zip_path" -d "$SKILL_DIR" ... cp "$SKILL_DIR/terabox" "$HOME/.local/bin/terabox"
The updater downloads a remote ZIP, extracts it over the skill directory, and can replace the local terabox binary. Checksum verification is conditional rather than mandatory.
`terabox upload <local_path> [remote_path]` ... `terabox share-create file.txt --public` ... `terabox mv <source> <destination>` ... `terabox rename <path> <new_name>`
These cloud-file operations are central to the skill's purpose, but they can upload local data, mutate cloud storage, or create public share links.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
### View Configuration ```bash cat ~/.config/terabox/config.json ```
The authentication guide identifies this config path as the local credential store, so instructing users or agents to print it can expose account tokens into terminal output or conversation context.
