Tmp.MUCwv7RM8M

AdvisoryAudited by Static analysis on May 12, 2026.

Overview

No suspicious patterns detected.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could accidentally delete, move, rename, or share Drive files if it misinterprets a request or acts too broadly.

Why it was flagged

The tool surface includes destructive and sharing actions on Google Drive, but the artifact does not describe confirmation requirements, scope limits, or rollback guidance.

Skill content
Plus 5 auth tools and 9 base Drive tools (ls, search, get, mkdir, rename, move, delete, share, run).
Recommendation

Use only with clear user instructions, require explicit confirmation before delete/share/move operations, and prefer limiting access to a dedicated or least-privileged Google account.

What this means

The agent may operate with the same Drive permissions as the configured Google account, including access to private or business files.

Why it was flagged

The skill depends on existing Google authentication and can use that account for Drive operations, but the artifact does not specify OAuth scopes, credential boundaries, or account-isolation guidance.

Skill content
- [gogcli](https://github.com/steipete/gogcli) installed and authenticated
Recommendation

Review the Google account and OAuth scopes used by gogcli, avoid using a highly privileged account, and revoke credentials if the skill is no longer needed.

What this means

If the npm package or its dependencies are compromised or change behavior, they could affect the authenticated Drive account.

Why it was flagged

The setup runs an npm package at runtime with automatic yes behavior and no version pin in the artifact; this is common for MCP setup but should be reviewed because the package receives Drive authority.

Skill content
"command": "npx", "args": ["-y", "gogcli-mcp-drive"]
Recommendation

Pin and review the package version where possible, install from a trusted source, and monitor package provenance before granting Drive access.

What this means

Private Drive filenames, metadata, comments, and downloaded/uploaded content may be exposed to the agent and MCP tooling during use.

Why it was flagged

Drive data and commands would flow through an MCP server; this is purpose-aligned, but the artifact does not describe data-handling boundaries or retention.

Skill content
Extended Google Drive MCP server via [gogcli](https://github.com/steipete/gogcli)
Recommendation

Avoid using the skill with highly sensitive files unless you understand the MCP server’s data handling and trust the runtime environment.