Clawpod

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: clawpod Version: 0.1.7 The OpenClaw AgentSkill 'clawpod' is classified as benign. Its purpose is to fetch web content and search Google via a proxy service, which inherently requires network access. All instructions in SKILL.md and code examples in README.md consistently direct the agent to interact with the legitimate 'unblocker.joinmassive.com' API using the provided 'MASSIVE_UNBLOCKER_TOKEN'. There is no evidence of intentional harmful behavior such as data exfiltration to unauthorized endpoints, persistence mechanisms, or instructions for the agent to perform actions beyond the stated purpose. While the 'allowed-tools' permission for 'curl' is broad (`Bash(curl --proto =https *)`), it is necessary for the skill's function of accessing 'any website', and the skill's own instructions do not guide the agent to misuse this capability.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could help scrape or access sites in ways that violate site terms, legal restrictions, or expected access controls, and could consume the user's API credits.

Why it was flagged

The core capability is to bypass website anti-bot, CAPTCHA, and geo-restriction controls for arbitrary targets, which is high-risk and not bounded by authorization or acceptable-use guidance in the artifacts.

Skill content
Read any website or search Google, even when sites block bots or are geo-restricted. Handles CAPTCHAs, JavaScript rendering, and anti-bot protection server-side via residential proxies.
Recommendation

Use only for content you are authorized to access, require explicit user confirmation for bypassing protections, and add clear guardrails about robots.txt, terms of service, paywalls, and prohibited targets.

What this means

Anyone with the token may be able to use the user's Massive account or credits.

Why it was flagged

A Massive API token is expected for this service, but pasting it into chat may expose the credential to the agent session or logs.

Skill content
Once you have your token, paste it here or set it as an environment variable (`export MASSIVE_UNBLOCKER_TOKEN="your-token"`).
Recommendation

Prefer setting the token as an environment variable or secret, do not paste it into chat unless necessary, and rotate it if it is exposed.

What this means

Massive may see the URLs, search terms, and timing of the user's requests, which could be sensitive for private research or internal targets.

Why it was flagged

The target URL or search terms are sent to the external Massive Unblocker provider as part of the intended workflow.

Skill content
https://unblocker.joinmassive.com/browser?url=<encoded-url> ... https://unblocker.joinmassive.com/search?terms=<encoded-terms>
Recommendation

Avoid sending confidential, internal, or personally sensitive URLs and search queries unless the user accepts the provider data exposure.

What this means

It may be harder to verify exactly which publisher revision or source commit this instruction-only skill came from.

Why it was flagged

The supplied registry metadata lists version 0.1.7, while the package metadata points to 0.1.3 with an empty commit, creating a provenance/version verification gap.

Skill content
"latest": { "version": "0.1.3", "publishedAt": 0, "commit": "" }
Recommendation

Verify the publisher and homepage before trusting the token workflow, and prefer packages with consistent version and source provenance.