GitHub Automation

Security checks across static analysis, malware telemetry, and agentic risk

Overview

The skill matches its GitHub automation purpose, but it asks for a powerful GitHub token and the included script disables TLS certificate verification when sending that token.

Install only if you are comfortable reviewing and fixing the script. Before use, restore normal TLS certificate verification and use a fine-grained GitHub token scoped to only the repositories and actions you intend to automate.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A network attacker or malicious proxy could potentially intercept the GitHub token or tamper with API responses/actions.

Why it was flagged

The script disables hostname and certificate verification while sending the GitHub authorization token, so it cannot reliably verify that it is communicating with the real GitHub API.

Skill content
ctx = ssl.create_default_context()
    ctx.check_hostname = False
    ctx.verify_mode = ssl.CERT_NONE
...
        'Authorization': f'token {token}',
Recommendation

Do not use this script until TLS verification is restored; remove the CERT_NONE/check_hostname changes and rely on the default trusted certificate validation.

What this means

If the token is broad, the skill may be able to access private repository information and create or change GitHub content wherever the token allows.

Why it was flagged

The skill asks users to provide a GitHub token with broad repository and account-related permissions, without bounding it to specific repositories or least-privilege operations.

Skill content
Uses GITHUB_TOKEN environment variable.
...
- `repo` - Repository access
- `issues` - Issue management  
- `pull_requests` - PR access
- `notifications` - Read notifications
Recommendation

Use a fine-grained GitHub token limited to only the intended repositories and permissions, and declare the credential requirement clearly in metadata.

What this means

The agent could create visible GitHub issues if invoked with the user's token and repository details.

Why it was flagged

The tool can create GitHub issues through a POST request. This is purpose-aligned and user-directed, but it is still a state-changing action on a third-party account.

Skill content
endpoint = f"/repos/{owner}/{repo}/issues"
...
    return api_request(endpoint, token, 'POST', data)
Recommendation

Review repository, title, body, and labels before allowing issue-creation commands, especially on public or organization-owned repositories.