Design Tool
Analysis
Review before installing: it is advertised as Penpot, but the artifacts implement a local command-line logging tool that stores whatever is entered under the user’s home directory.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
name: Penpot description: "Penpot: The open-source design tool for design and code collaboration..." ... Design Tool v2.0.0 — a utility toolkit for logging, tracking, and managing design-related entries from the command line.
The same artifact brands the skill as Penpot while describing a generic local logging utility, which is a material mismatch from what a user would expect from a Penpot design tool integration.
Source: unknown Homepage: none No install spec — this is an instruction-only skill. Code file presence: scripts/script.sh
The package includes a script but has limited provenance and no installation specification, which is not inherently malicious but reduces clarity about source and setup.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
DATA_DIR="${HOME}/.local/share/design-tool"
mkdir -p "$DATA_DIR"
...
echo "$ts|$input" >> "$DATA_DIR/run.log"
...
_log "run" "$input"The script persistently stores user-provided text in local log files and history, which is expected for this tool but means sensitive notes would remain on disk.
