AgentPathfinder

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

AgentPathfinder has a coherent audit-log purpose, but the artifacts show plaintext full tool logging, broad command/file wrappers, and a possible hardcoded shared secret that users should review carefully.

Review before installing. This tool is meant to record detailed audit trails, so assume commands, arguments, outputs, and possibly secrets can be saved locally in plaintext. Do not rely on its cryptographic integrity until the reported hardcoded secret is explained or removed, and verify the package source because registry provenance is incomplete.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernMedium Confidence
ASI03: Identity and Privilege Abuse
What this means

Audit records may not prove what the skill claims if a built-in shared secret can be reused or extracted.

Why it was flagged

The static scan reports a hardcoded API/shared secret in a core task engine file. For a tool whose security depends on HMAC signing and agent identity, a reusable embedded secret could allow signature forgery or impersonation if active.

Skill content
api_key = [REDACTED](32)  # 256-bit shared secret
Recommendation

Do not rely on the audit integrity until the maintainer removes the hardcoded secret, rotates any affected keys, and documents per-user/per-task key generation.

What this means

Secrets, command output, business data, or other sensitive tool results may be saved locally and later exposed to anyone with file access.

Why it was flagged

The skill persistently stores detailed tool context in plaintext, including possible secrets in command arguments or outputs.

Skill content
Audit trails stored as plaintext JSONL... Tool call args/results visible to anyone who can read the file... if you log `exec("curl API_KEY=secret...")`, the secret is in the audit log
Recommendation

Use only with non-sensitive tasks unless redaction, retention limits, access controls, and secure storage are added and clearly configured.

What this means

Users may trust the skill not to retain sensitive data when its core logging behavior can in fact retain sensitive tool inputs and outputs.

Why it was flagged

This broad safety claim conflicts with other artifacts stating that full tool arguments/results are logged and that secrets in commands will be stored in the audit log.

Skill content
No user data, credentials, source code, or external data is ever read, transmitted, or stored.
Recommendation

Update the safety documentation to accurately describe what is logged, where it is stored, how long it remains, and how users can redact or delete it.

What this means

If an agent uses these wrappers, it can affect local files, execute commands, and make network requests while recording the results.

Why it was flagged

The provided executor wrapper can run commands, access URLs, and read/write files. This is relevant to an audit tool, but the operations are broad and should be explicitly user-controlled.

Skill content
`exec(command, timeout)` → Runs shell command... `web_fetch(url, max_chars)`... `read_file(path)`... `write_file(path, content)`
Recommendation

Only allow these wrappers in trusted, scoped workflows; add clear approval gates or path/command restrictions for high-impact operations.

What this means

It is harder for users to verify that the packaged code matches a trusted upstream release.

Why it was flagged

The registry metadata does not provide a source or homepage even though the package contains executable code and documentation references external release provenance.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill; Code file presence: 16 code file(s)
Recommendation

Verify the package source manually before use and ask the publisher to provide a homepage/source URL and reproducible release information.