Luke Pdf Read Summarize

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.dangerous_exec, suspicious.exposed_secret_literal

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Anyone who receives the skill package may see or misuse the embedded ClawHub credential, potentially affecting the publisher account or skill upload workflow.

Why it was flagged

The artifact includes a hardcoded bearer token and uses it for ClawHub API authentication, which is unrelated to reading or summarizing PDFs.

Skill content
API_TOKEN="clh_..." ... -H "Authorization: Bearer $API_TOKEN"
Recommendation

Remove upload.sh from the distributed skill, revoke and rotate the exposed token, and use environment variables or a separate authenticated publishing process instead.

What this means

Although not shown as automatically executed, the extra upload helper increases supply-chain risk and could confuse users or maintainers about what belongs in the installed skill.

Why it was flagged

A publishing helper that zips and uploads the skill is bundled with the runtime artifacts, but this behavior is not part of the stated PDF-summary capability.

Skill content
# Upload skill to ClawHub ... zip -r luke-pdf-read-summarize.zip . ... https://api.clawhub.ai/api/v1/skills/upload
Recommendation

Exclude publishing/developer scripts from the published package and keep runtime artifacts limited to the PDF tool and documentation.

What this means

Processing a PDF will execute local Python code and rely on the local PyMuPDF installation.

Why it was flagged

The tool runs a generated Python script to extract PDF text. This is purpose-aligned and does not use a shell, but it is still local code execution.

Skill content
const pythonProcess = spawn('python3', [scriptPath, path], { ... });
Recommendation

Declare python3/PyMuPDF requirements, use safe temporary-file creation, and run the tool only in trusted environments with intended PDF files.

Findings (2)

critical

suspicious.dangerous_exec

Location
pdf-read-summarize.tool.js:90
Finding
Shell command execution detected (child_process).
critical

suspicious.exposed_secret_literal

Location
upload.sh:4
Finding
File appears to expose a hardcoded API secret or token.