Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Auth0 Android

v1.0.0

Use when adding authentication to Android applications (Kotlin/Java) with Web Auth, biometric-protected credentials, and MFA - integrates com.auth0.android:a...

0· 78·0 current·0 all-time

Install

OpenClaw Prompt Flow

Install with OpenClaw

Best for remote or guided setup. Copy the exact prompt, then paste it into OpenClaw for auth0/auth0-android.

Previewing Install & Setup.
Prompt PreviewInstall & Setup
Install the skill "Auth0 Android" (auth0/auth0-android) from ClawHub.
Skill page: https://clawhub.ai/auth0/auth0-android
Keep the work scoped to this skill only.
After install, inspect the skill metadata and help me finish setup.
Use only the metadata you can verify from ClawHub; do not invent missing requirements.
Ask before making any broader environment changes.

Command Line

CLI Commands

Use the direct CLI path if you want to install manually and keep every step visible.

OpenClaw CLI

Bare skill slug

openclaw skills install auth0-android

ClawHub CLI

Package manager switcher

npx clawhub@latest install auth0-android
Security Scan
Capability signals
Requires OAuth tokenRequires sensitive credentials
These labels describe what authority the skill may exercise. They are separate from suspicious or malicious moderation verdicts.
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The skill's purpose (Auth0 Android integration) matches the included scripts and instructions (SDK dependency, project edits, creating Auth0 clients/connections). However the registry metadata lists no required binaries/envs while SKILL.md and scripts require Node >=20, the Auth0 CLI, the GitHub CLI (gh) for fetching releases, and a working Android Gradle project — this mismatch (undeclared prerequisites) is an incoherence that should be fixed or explained.
Instruction Scope
Runtime instructions direct the agent to read and modify the Android project (search for click handlers, update strings.xml, add manifest placeholders) and to call external CLIs (gh, auth0) and build with ./gradlew — these actions are within the stated purpose. The SKILL.md sensibly advises not to run interactive auth0 login from the agent. No explicit instructions to read unrelated system secrets were found.
!
Install Mechanism
There is no platform install spec, but the included bootstrap instructs the user/agent to run npm install in the scripts directory. The provided package-lock.json resolves many packages to an unusual host (a0us.jfrog.io) rather than the public npm registry, which is a supply-chain / provenance risk if unexpected. Running npm install will write third-party code to disk and execute it via node; that elevates risk compared to an instruction-only skill.
!
Credentials
The skill does not declare any required environment variables or primary credential but it relies on a logged-in Auth0 CLI session (the bootstrap uses auth0 tenants list and creates apps/connections), and the SKILL.md asks the agent to run gh api. Access to an Auth0 tenant is privileged (creating clients and connections). Not declaring these requirements reduces transparency and increases the chance of unexpected privileged operations.
Persistence & Privilege
The skill is not force-enabled (always: false) and does not request system-wide privileges. Its actions are limited to modifying the user's Android project files (strings.xml, Gradle files) and making changes in the user's Auth0 tenant via the auth0 CLI, which is consistent with its purpose. It does not modify other skills or global agent configuration.
What to consider before installing
This skill appears to implement an Auth0 Android integration and includes a bootstrap script that can create Auth0 clients/connections and modify your Android project. Before running it: 1) Be aware you (or the agent) will need Node >=20, the Auth0 CLI (and an active auth0 login/session), the GitHub CLI (gh) for release lookup, and a working Android Gradle project — these prerequisites are not declared in the registry metadata. 2) Inspect scripts/bootstrap.mjs and the utils/*.mjs files yourself to confirm the exact changes. 3) Review scripts/package-lock.json: many packages resolve to a non-standard host (a0us.jfrog.io). If you will run npm install, verify package provenance or run in an isolated environment. 4) Back up your project and consider running the bootstrap against a non-production Auth0 tenant first. 5) If you prefer not to grant the bootstrap permission to your Auth0 tenant, follow the manual setup instructions in SKILL.md instead. If the author can confirm the package-lock uses an official mirror and update the skill metadata to list required binaries/permissions, this would increase confidence.

Like a lobster shell, security has layers — review code before you run it.

Runtime requirements

🔐 Clawdis
latestvk97d3epte51gynbkegw9xdrs4x84xdzx
78downloads
0stars
1versions
Updated 1w ago
v1.0.0
MIT-0

Auth0 Android Integration

Add authentication to Android applications using com.auth0.android:auth0.

Agent instruction: Before providing SDK setup instructions, fetch the latest release version by running:

gh api repos/auth0/Auth0.Android/releases/latest --jq '.tag_name'

Use the returned version in all implementation dependency lines instead of any hardcoded version below. If the command fails, fall back to checking https://github.com/auth0/Auth0.Android/releases.

Prerequisites

  • Android API 21 or higher
  • Kotlin or Java project
  • Auth0 account with a Native application configured
  • If you don't have Auth0 set up, see auth0-quickstart

When NOT to Use

Quick Start Workflow

  1. Install SDK: Add the Auth0 Android SDK dependency to your build.gradle:

    implementation 'com.auth0.android:auth0:{LATEST_VERSION}'
    
  2. Configure Auth0:

    See Setup Guide for automatic/manual setup, post-setup required project changes, and callback URL configuration.

  3. Initialize: Create an Auth0 account instance:

    import com.auth0.android.Auth0
    
    val account = Auth0.getInstance(context)
    
  4. Add Auth UI: Implement login and logout with Web Auth:

    Agent instruction: Before adding new UI elements, search the project for existing click handlers for login, logout, sign-in, or sign-out buttons (e.g., loginButton, signInButton, logoutButton, signOutButton, or setOnClickListener with auth-related naming). If existing handlers are found, hook the Auth0 code into them without modifying the existing UI. Only create new buttons if no existing handlers are found.

    Login:

    import com.auth0.android.Auth0
    import com.auth0.android.authentication.AuthenticationAPIClient
    import com.auth0.android.authentication.storage.SecureCredentialsManager
    import com.auth0.android.authentication.storage.SharedPreferencesStorage
    import com.auth0.android.callback.Callback
    import com.auth0.android.authentication.AuthenticationException
    import com.auth0.android.provider.WebAuthProvider
    import com.auth0.android.result.Credentials
    
    val account = Auth0.getInstance(context)
    val authentication = AuthenticationAPIClient(account)
    val storage = SharedPreferencesStorage(context)
    val credentialsManager = SecureCredentialsManager(context, authentication, storage)
    
    WebAuthProvider.login(account)
        .withScheme(getString(R.string.com_auth0_scheme))
        .withScope("openid profile email offline_access")
        .start(this, object : Callback<Credentials, AuthenticationException> {
            override fun onSuccess(result: Credentials) {
                // User authenticated
                val idToken = result.idToken
                val accessToken = result.accessToken
                // Store credentials securely
                credentialsManager.saveCredentials(result)
            }
            override fun onFailure(error: AuthenticationException) {
                // Handle authentication failure
                Log.e("Auth0", "Authentication failed", error)
            }
        })
    

    Logout:

    WebAuthProvider.logout(account)
        .withScheme(getString(R.string.com_auth0_scheme))
        .start(this, object : Callback<Void?, AuthenticationException> {
            override fun onSuccess(result: Void) {
                // User logged out
            }
            override fun onFailure(error: AuthenticationException) {
                Log.e("Auth0", "Logout failed", error)
            }
        })
    
  5. Build & Verify:

    Agent instruction: After completing the integration, build the project to verify it compiles successfully:

    ./gradlew assembleDebug
    

    If the build fails, analyze the error output and fix the issues. Common integration build failures include:

    • Unresolved reference: Missing import statements — add the required import com.auth0.android.* imports
    • Cannot resolve symbol R.string.com_auth0_scheme: strings.xml not updated — verify com_auth0_scheme, com_auth0_client_id, and com_auth0_domain entries exist
    • Incompatible types in callback: Callback type parameters don't match — ensure Callback<Credentials, AuthenticationException> for login and Callback<Void?, AuthenticationException> for logout
    • Unresolved lifecycleScope: Missing dependency — add implementation 'androidx.lifecycle:lifecycle-runtime-ktx:2.6.+' or move code out of coroutine scope
    • minSdk too low: SDK requires API 21+ — update minSdkVersion to at least 21
    • Java version mismatch: SDK requires Java 8 — add compileOptions with JavaVersion.VERSION_1_8

    Re-run the build after each fix. Track the number of build-fix iterations.

    Failcheck: If the build still fails after 5–6 fix attempts, stop and ask the user using AskUserQuestion: "The build is still failing after several fix attempts. How would you like to proceed?"

    • Let the skill continue fixing iteratively — continue the build-fix loop for another 5–6 attempts
    • Fix it manually — show the remaining errors and let the user resolve them
    • Skip build verification — proceed without a successful build

    Repeat this check after every 5–6 iterations if errors persist. Do not leave the project in a non-compiling state without the user's explicit consent.

    The callback URL must match your Auth0 application settings: {SCHEME}://{YOUR_AUTH0_DOMAIN}/android/{YOUR_APP_PACKAGE_NAME}/callback

Detailed Documentation

  • Setup Guide — Install SDK, configure Auth0 application, set up callback URLs, Android App Links, custom schemes, ProGuard/R8
  • Integration Patterns — Web Auth login/logout, credential storage, biometric authentication, database login, passwordless authentication, MFA handling, custom tabs, error handling
  • Testing & Reference — Testing checklist, common issues, security considerations, API reference

Common Mistakes

MistakeFix
App type not set to Native in Auth0 DashboardCreate a Native application type in your Auth0 tenant. The Android SDK requires Native app configuration, not Machine-to-Machine or other types.
Missing callback URL in Allowed Callback URLsAdd {SCHEME}://{YOUR_AUTH0_DOMAIN}/android/{YOUR_APP_PACKAGE_NAME}/callback to your Auth0 application's Allowed Callback URLs setting, where {SCHEME} matches com_auth0_scheme in strings.xml (e.g., demo by default).
Missing <uses-permission android:name="android.permission.INTERNET" />Add the INTERNET permission to AndroidManifest.xml. The SDK requires network access for authentication.
Custom scheme in lowercaseAndroid requires scheme names to be lowercase. Use https (recommended) or lowercase custom scheme like myapp://callback.
Forgetting .validateClaims() on direct auth callsAlways call .validateClaims() when using AuthenticationAPIClient directly (for database, passwordless, or API login). Web Auth validates automatically.
Storing tokens in SharedPreferences without encryptionUse SecureCredentialsManager to store credentials. Never store tokens manually in plain text. The manager encrypts tokens at rest.
Missing manifest placeholdersAdd manifestPlaceholders = [auth0Domain: "@string/com_auth0_domain", auth0Scheme: "@string/com_auth0_scheme"] to your build.gradle defaultConfig block.

Related Skills

Quick Reference

Core Classes

ClassPurpose
Auth0Entry point for SDK, holds app credentials
WebAuthProviderOAuth 2.0 login/logout via browser
AuthenticationAPIClientDirect API calls (database login, passwordless, MFA)
SecureCredentialsManagerSecure storage and retrieval of credentials
CredentialsUser tokens and expiration

Common Use Cases

References

Comments

Loading comments...