Consent

WarnAudited by ClawScan on May 18, 2026.

Overview

The skill appears local-only, but its cookie-consent description does not match a credential/security logging CLI that encourages storing secrets in persistent plaintext files.

Treat this as a plaintext local logging script, not a secure consent or password tool. Do not enter real passwords, API keys, or private consent records unless you are comfortable storing them under `~/.local/share/consent`; verify the install path and consider removing any generated logs if you test it.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user's agent may send credential or token information to a tool selected for consent-banner work.

Why it was flagged

The artifact expands from cookie consent/banner work into token, credential, and password-like handling, which is not clearly justified by the stated purpose.

Skill content
description: "Build cookie consent banners and track opt-in compliance status..." ... "Security toolkit for managing consent records — generate tokens, check strength, rotate credentials..."
Recommendation

Limit this skill to consent records, or clearly separate and disclose any credential-handling functionality with explicit user approval.

What this means

Passwords, API keys, consent records, or other private values could remain in plaintext logs and later be shown by recent/search/export commands or read by other local processes.

Why it was flagged

The code persists raw command input and a history entry in local log files; the documented examples include credentials and passphrases, so this persistent memory can contain sensitive secrets.

Skill content
DATA_DIR="${HOME}/.local/share/consent" ... echo "$ts|$input" >> "$DATA_DIR/store.log" ... _log "store" "$input"
Recommendation

Do not store real secrets with this skill; add encryption or hashing where appropriate, redact sensitive input, and document retention and deletion controls.

What this means

Users may believe the tool protects stored consent or credential data when it only writes plaintext files locally.

Why it was flagged

Calling plaintext log storage 'secure' can mislead users or agents into trusting it with sensitive values.

Skill content
`consent store <input>` | Store a value securely in the local data log ... All data is local plain-text. No network calls, no cloud sync.
Recommendation

Change the wording to state plainly that storage is unencrypted plaintext, and avoid presenting it as secure unless real protections are implemented.

What this means

Users may be uncertain what code is actually invoked when using `consent`.

Why it was flagged

The artifact includes a runnable-looking script and documents a CLI command, but does not declare how that command is installed or made available.

Skill content
Install specifications: No install spec — this is an instruction-only skill. Code file presence: scripts/script.sh (11636 bytes).
Recommendation

Provide a clear install spec or setup instructions, and align metadata with the included script.