Back to skill
Skillv1.0.0

ClawScan security

Pipeworx asana · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 22, 2026, 11:32 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill claims to wrap the Asana API but its runtime instructions point at an external Pipeworx gateway and mention OAuth while declaring no credentials or auth requirements — this mismatch and the external endpoint raise privacy and coherence concerns.
Guidance
This skill is suspicious because it points your Asana API calls at an external Pipeworx gateway and talks about OAuth while declaring no credentials — that means your Asana data and any access tokens might be routed through and visible to an external service with no publisher info. Before installing, ask the publisher for: (1) the identity and trust/legal/privacy info for gateway operator (https://gateway.pipeworx.io), (2) a clear auth flow (which env vars or OAuth client is required and where tokens are stored), (3) why a gateway is used instead of calling api.asana.com directly, and (4) an untruncated SKILL.md with exact runtime requests and data-sharing guarantees. If you cannot verify the gateway operator and auth handling, avoid installing or only use with a test Asana account that has no sensitive data.

Review Dimensions

Purpose & Capability
concernThe name/description say this skill accesses Asana via API, which is coherent, but the SKILL.md references an external gateway (https://gateway.pipeworx.io/asana/mcp) instead of the official Asana API and mentions OAuth. The skill declares no required env vars or primary credential despite needing OAuth tokens in practice. It's unclear why a gateway is used and who operates it; that is disproportionate or at least unexplained.
Instruction Scope
concernSKILL.md is the only runtime instruction and it instructs the agent to use an external 'mcpServers' endpoint. The file references OAuth and endpoint usage but is truncated/partial and provides no auth flow, no explicit instructions about which secrets to use, and no limits on what data the gateway receives. That grants the gateway potential access to all Asana data the skill touches without declared consent or explanation.
Install Mechanism
okNo install spec and no code files (instruction-only). This is low-risk from an installation perspective because nothing is downloaded or written automatically. However, runtime network calls to the external gateway are still a behavioral risk.
Credentials
concernThe SKILL.md explicitly references OAuth (so credentials/tokens are required in practice) but the skill metadata lists no required env vars or primary credential. That mismatch is a red flag: either the gateway handles auth (in which case you must trust it), or the skill will expect credentials but fails to declare them. No justification is provided for sending data via a third-party gateway.
Persistence & Privilege
okThe skill is not marked always:true and has no install-time persistence. It can be invoked autonomously (the platform default), which is normal, but this does expand the blast radius if the gateway is untrusted. There is no evidence it modifies agent/system configuration.