Siphonclaw Skill

WarnAudited by ClawScan on May 10, 2026.

Overview

SiphonClaw has a coherent document-search purpose, but it asks for broad document indexing and persistent reuse while relying on external code and integrations that are not clearly bounded in the reviewed artifacts.

Install only if you are comfortable auditing the external GitHub project yourself. Before use, restrict ingestion to specific folders, avoid sensitive documents until deletion and retention behavior is clear, use scoped API keys, and do not expose Telegram, email, SSE, or API access without strong authentication.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent using this skill could ingest and index sensitive local or shared documents if given, inferred, or mistakenly supplied a broad path.

Why it was flagged

The ingestion tool is documented as accepting arbitrary absolute file paths, and the artifacts do not specify path allowlists, user confirmation requirements, or exclusions before indexing local files.

Skill content
`file_path` | string | yes | Absolute path to the file to ingest
Recommendation

Require explicit user approval for each ingest path, restrict ingestion to user-selected directories, add exclusions for sensitive locations, and provide a dry-run list before indexing.

What this means

Private documents, photos, spreadsheets, or repair notes may become long-lived searchable memory and may influence future answers, including if inaccurate or sensitive notes are captured.

Why it was flagged

The skill is designed to persist indexed document content and field captures for future retrieval, but the artifacts do not define retention, deletion, access controls, review workflows, or limits on what content should be indexed.

Skill content
Ingest PDFs, images, and spreadsheets into a searchable knowledge base with dual-track retrieval (text + visual), OCR, confidence scoring, and field capture.
Recommendation

Document where indexes are stored, how to delete them, what paths are excluded, how field notes are reviewed, and when stored content may be reused across tasks or users.

What this means

Users would be running unreviewed external code to handle documents, credentials, and MCP tools, so the clean scan of this registry package does not verify the actual implementation.

Why it was flagged

The reviewed package is instruction-only, but setup depends on external repository code and requirements that are not included in the registry artifact or static scan.

Skill content
git clone https://github.com/curtisgc1/siphonclaw.git
cd siphonclaw
pip install -r requirements.txt
Recommendation

Publish the reviewed implementation with the skill, add an install spec, pin dependencies, provide hashes or releases, and ensure the registry metadata points to the exact audited source.

What this means

If configured, these credentials can grant access to model providers, messaging channels, email pipelines, or paid search APIs.

Why it was flagged

The README describes API keys and bot/email/search tokens even though registry metadata lists no required environment variables or primary credential.

Skill content
OPENROUTER_API_KEY=sk-or-v1-xxxxx ... TELEGRAM_BOT_TOKEN=your-bot-token ... AGENTMAIL_API_KEY=your-agentmail-key ... BRAVE_SEARCH_API_KEY=BSA-xxxxx
Recommendation

Use least-privilege keys, set spending limits, avoid sharing tokens with unrelated workflows, and declare all supported credentials in the skill metadata.

What this means

Sensitive indexed knowledge could be exposed through bot, email, API, or MCP interfaces if access controls are weak or misconfigured.

Why it was flagged

The artifacts describe remote and multi-client access paths to the knowledge base but do not document authentication, user identity boundaries, authorization, or data exposure controls for those channels.

Skill content
Access from anywhere -- Telegram bot, email pipeline, CLI, or Python API
Recommendation

Document authentication and authorization for every access channel, bind local servers safely by default, and require explicit opt-in before exposing the knowledge base over networked interfaces.