Farmos Marketing

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill matches its FarmOS marketing purpose, but it relies on undeclared local authentication files/scripts and non-HTTPS API calls for sensitive financial data, so it should be reviewed before use.

Install only if you recognize and trust this FarmOS API and the local `farmos-auth.sh` helper. Verify the role-mapping file is correct, use the least-privileged role, ensure the HTTP endpoint is on a secured private network or switch to HTTPS, and be cautious with full CSV exports or revenue/settlement outputs.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the role file or token handling is wrong, the agent could disclose protected farm marketing, contract, settlement, or revenue data to someone who should not receive it.

Why it was flagged

This shows the skill uses manager/admin JWTs and a local role-mapping file to gate access to protected marketing data, even though the registry declares no primary credential or required config path.

Skill content
TOKEN=$(~/clawd/scripts/farmos-auth.sh admin) ... TOKEN=$(~/clawd/scripts/farmos-auth.sh manager) ... Check the sender's role in `~/.clawdbot/farmos-users.json`.
Recommendation

Declare the credential and role-file requirements, prefer the least-privileged manager role by default, and make the role check mandatory before using both authenticated and unauthenticated endpoints.

What this means

A missing, modified, or unsafe helper script could run unexpected local code or mishandle FarmOS credentials.

Why it was flagged

Runtime authentication depends on a local helper script outside the provided skill package; no code or install spec was supplied to verify what that helper does with privileged tokens.

Skill content
TOKEN=$(~/clawd/scripts/farmos-auth.sh admin)
Recommendation

Bundle or document the helper with provenance, pin/audit its contents, declare it as a required dependency, and avoid running it automatically without user awareness.

What this means

Bearer tokens and financial farm data could be exposed if the network path is not otherwise protected.

Why it was flagged

The documented request sends a bearer token to an HTTP endpoint; the artifacts do not explain TLS, private-network protections, or other safeguards for this sensitive provider/API flow.

Skill content
curl -H "Authorization: Bearer $TOKEN" http://100.102.77.110:8013/api/endpoint
Recommendation

Use HTTPS where possible, or clearly document that this endpoint is only reachable over a secured private network; avoid sending JWTs over untrusted HTTP connections.

What this means

The agent may produce or export full contract/position data, which could be sensitive if shared broadly.

Why it was flagged

The skill discloses broad read/export capability for marketing positions; this is purpose-aligned, but it can retrieve complete sensitive business records.

Skill content
GET /api/positions/export?crop_year=2025 ... Returns: CSV export of all positions.
Recommendation

Limit outputs to the requested crop year/entity, confirm before producing full exports, and avoid sharing results with unauthorized users.