Authensor Gateway
Analysis
This appears to be a purpose-aligned Authensor policy gate, but it works by changing tool-call behavior and sending redacted action metadata to a configured control plane.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
**You MUST follow this protocol before executing any tool call.** No exceptions.
This is broad agent-behavior control. It is expected for a policy-gate skill, but it changes the normal sequence for all tool calls when the skill is active.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
requires:
env:
- CONTROL_PLANE_URL
- AUTHENSOR_API_KEYThe skill requires an Authensor API key and control-plane URL. This is expected for the integration, but it is still delegated account access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Before sending the resource to the control plane, **strip any sensitive data** ... `Bash` ... `The full command string` ... `MCP tool calls` ... `The tool name and arguments`
The skill sends redacted action-resource metadata to a configured control plane. That is core to the gateway purpose, but the metadata can still include operationally sensitive paths, commands, URLs, and tool arguments.
Every action (allowed, denied, or pending) is logged with a receipt ID and timestamp.
The skill discloses persistent audit logging of action records. This is purpose-aligned for compliance, but users should understand what is retained.
