Env credential access
- Finding
- Environment variable access combined with network send.
Security checks across static analysis, malware telemetry, and agentic risk
This appears to be a coherent bot-identity toolkit, but users should protect generated bot keys and confirm any action that changes the public registry.
Before installing or using this skill, confirm which registry URL you will trust, protect generated `.key.json` and `.ric.json` files, and require explicit approval before registering bots or submitting reports. If deploying the registry, set a strong RIC_ADMIN_KEY and review the omitted extension/registry files separately if they were not part of your local audit.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Bot registration metadata, including developer contact details and bot purpose, can be sent to the selected registry.
The CLI sends bot registration data to a registry endpoint. This is expected for the stated bot-identity purpose, but the destination is configurable.
const REGISTRY = process.env.RIC_REGISTRY || 'https://registry.robotidcard.dev' ... fetch(`${REGISTRY}/v1/bots/register`, { method: 'POST', ... body: JSON.stringify(payload) })Verify the registry URL before registering, and avoid using personal or sensitive contact details unless you intend them to be part of the bot registry.
Anyone who obtains the saved key or certificate JSON can impersonate that bot identity.
The CLI writes the bot private key into the local certificate/config file so it can later sign claims and requests.
const config = { ...certificate, private_key_hex: privateKeyHex }
fs.writeFileSync(opts.out, JSON.stringify(config, null, 2))Keep generated key and certificate files out of source control, restrict file permissions, and rotate or re-register the bot if a key is exposed.
Improper or accidental reports could affect another bot's public reputation or access level.
The skill includes a reporting workflow that can contribute to downgrading or blocking a bot in the public registry.
自动降级 | 3 次举报 → 自动标记 dangerous → Level 0 封锁 ... CLI 工具 | `ric keygen / register / claim / status / verify / report`
Use `ric report` only with explicit user intent and supporting evidence; registry operators should enforce authentication, rate limits, and an appeal or reversal process.
Automated installers may not warn users about needed tooling or configurable runtime settings.
The registry metadata does not declare the Node/npm runtime and environment variables described in the skill and package documentation.
Required binaries (all must exist): none ... Required env vars: none ... No install spec — this is an instruction-only skill.
Update metadata to declare Node/npm requirements and relevant environment variables such as RIC_REGISTRY and deployment-only RIC_ADMIN_KEY.