Authensor Gateway

ReviewAudited by ClawScan on May 1, 2026.

Overview

This appears to be a purpose-aligned Authensor policy gate, but it works by changing tool-call behavior and sending redacted action metadata to a configured control plane.

This skill looks coherent with its stated security-gateway purpose. Before installing, confirm it will be enabled in the sessions where you expect protection, verify the control-plane URL, use a dedicated API key, review policy and log-retention settings, and avoid embedding secrets in command lines, URLs, or tool arguments.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Tool calls may be delayed, require approval, or be blocked according to Authensor policy.

Why it was flagged

This is broad agent-behavior control. It is expected for a policy-gate skill, but it changes the normal sequence for all tool calls when the skill is active.

Skill content
**You MUST follow this protocol before executing any tool call.** No exceptions.
Recommendation

Use it only when you intentionally want Authensor to mediate tool execution, and test the policy defaults before relying on it.

What this means

Authensor or the configured control plane may see details about what tools are being used and what resources they target.

Why it was flagged

The skill sends redacted action-resource metadata to a configured control plane. That is core to the gateway purpose, but the metadata can still include operationally sensitive paths, commands, URLs, and tool arguments.

Skill content
Before sending the resource to the control plane, **strip any sensitive data** ... `Bash` ... `The full command string` ... `MCP tool calls` ... `The tool name and arguments`
Recommendation

Verify the CONTROL_PLANE_URL, review the service's privacy and retention terms, and avoid putting secrets directly in commands, URLs, or tool arguments.

What this means

A leaked or overly broad API key could expose or alter Authensor policy or audit data depending on the service's account controls.

Why it was flagged

The skill requires an Authensor API key and control-plane URL. This is expected for the integration, but it is still delegated account access.

Skill content
requires:
  env:
    - CONTROL_PLANE_URL
    - AUTHENSOR_API_KEY
Recommendation

Use a dedicated least-privilege API key, store it securely, and rotate or revoke it if it may have been exposed.

What this means

A history of tool actions may be stored outside the immediate chat session.

Why it was flagged

The skill discloses persistent audit logging of action records. This is purpose-aligned for compliance, but users should understand what is retained.

Skill content
Every action (allowed, denied, or pending) is logged with a receipt ID and timestamp.
Recommendation

Review audit-log retention, access controls, and deletion options before using it in sensitive environments.