EngageLab SMS

Security checks across static analysis, malware telemetry, and agentic risk

Overview

This appears to be a straightforward EngageLab SMS helper, but it can send real SMS messages and change or delete SMS account resources without documented confirmation guardrails.

Install only if you trust the skill and need EngageLab SMS automation. Before using real credentials, verify the code against official EngageLab docs and require the agent to show and confirm recipients, message template/parameters, schedule, and any template/signature changes—especially deletes or bulk/marketing sends.

Static analysis

No static analysis findings were reported for this release.

VirusTotal

VirusTotal findings are pending for this skill version.

View on VirusTotal

Risk analysis

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

An agent could send unintended SMS messages, incur costs, contact customers, or delete/change templates and sender IDs if the user gives credentials and the action is not carefully confirmed.

Why it was flagged

The skill exposes external SMS sending plus account resource creation/update/deletion. The provided artifacts do not add approval, recipient-count limits, consent/cost checks, or safe dry-run guidance before those high-impact actions.

Skill content
“Send SMS — Send notification or marketing SMS to one or more recipients” ... “Template Management — Create, read, update, and delete” ... “Signature (Sender ID) Management — Create, read, update, and delete”
Recommendation

Require explicit final confirmation before every send, scheduled send, bulk recipient list, marketing message, update, or delete. Show recipients, template ID/content parameters, schedule time, expected impact, and make destructive actions opt-in.

What this means

If these credentials are exposed or reused in an unsafe context, someone could send SMS messages or manage templates/signatures on the user’s EngageLab account.

Why it was flagged

EngageLab account credentials are required for the integration and are used for Basic Authentication. This is purpose-aligned, but the credentials authorize real account actions.

Skill content
“The user must provide their dev_key and dev_secret ... Authorization: Basic <base64(dev_key:dev_secret)>”
Recommendation

Use least-privileged EngageLab credentials if available, avoid pasting secrets into shared chats or logs, rotate credentials if exposed, and confirm that credentials are only sent to the EngageLab API endpoint.

What this means

Users have less external assurance about who maintains the skill or whether it matches official EngageLab guidance.

Why it was flagged

The implementation is visible and there is no install script, but the artifact metadata does not provide a public source or homepage for provenance verification.

Skill content
“Source: unknown” and “Homepage: none”
Recommendation

Review the included code and compare endpoints, parameters, and authentication behavior with official EngageLab documentation before using production credentials.