GitHub Star Manager

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: github-star-manager-skill Version: 0.1.2 The OpenClaw skill 'github-star-manager' is classified as benign. All operations described in SKILL.md, such as exporting GitHub stars, managing lists, and unstarring repositories, are directly aligned with its stated purpose. The skill exclusively uses the official GitHub CLI (`gh`) and `jq` for data processing, writing only public GitHub data to a local file (`stars.json`). There is no evidence of data exfiltration, malicious execution, persistence mechanisms, or prompt injection attempts designed to mislead the AI agent into performing unauthorized actions. While the skill notes that 'user' scope on a GitHub Classic token is required for list operations (a broader permission), this is explicitly stated as necessary for functionality and relies on the user's existing `gh` authentication session, not a new token request or storage.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the user approves the wrong targets, repositories could be added to the wrong Lists or unstarred.

Why it was flagged

The skill intentionally exposes GitHub API operations that can change the user's account state, including adding repositories to Lists and unstarring. This is purpose-aligned and confirmation is requested, but it is still a sensitive capability.

Skill content
Supports semantic categorization via LLM and bulk operations (unstar, add-to-list).
Recommendation

Review an itemized list of repositories before any batch operation, keep the exported stars.json as a backup, and test small batches first.

What this means

Commands run as the currently authenticated GitHub user and can affect that account's stars and Lists.

Why it was flagged

The skill operates through the user's existing GitHub CLI authentication and may require the GitHub user scope for Lists operations. This is disclosed and expected for the integration, but it grants delegated account authority.

Skill content
This skill uses the `gh` CLI's existing auth session... token needs `user` scope — run `gh auth refresh -s user` or use a Classic token
Recommendation

Check `gh auth status` before use, ensure it is the intended GitHub account, and use the least privilege scope needed for the requested operation.

NoteHigh Confidence
ASI08: Cascading Failures
What this means

A bad category suggestion or stale-repo filter could affect many starred repositories if approved without careful review.

Why it was flagged

The intended workflow can apply AI-generated categorization or cleanup decisions across many repositories. The review step mitigates this, but mistakes could propagate through a batch.

Skill content
Analyze the JSON — suggest categories ... Create Lists and add repos after confirmation ... Batch operations with delays between API calls
Recommendation

Require a detailed preview, limit batch size, and confirm high-impact actions such as unstarring separately from low-impact list additions.

What this means

New Lists may be public, which could expose how the user has organized starred repositories.

Why it was flagged

The example creates GitHub Lists as public by default. This is visible in the command, but the prose does not separately call out the privacy choice.

Skill content
createUserList(input: {name: $name, description: $desc, isPrivate: false})
Recommendation

Explicitly decide whether each List should be public or private, and change the command to `isPrivate: true` when privacy is desired.