Back to skill
Skillv1.10.5
ClawScan security
Agent Teams · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousMar 6, 2026, 3:40 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's stated purpose (control Microsoft Teams) matches most of its behavior, but it instructs the agent to extract live authentication tokens from the Teams desktop app and to read/write local config files without declaring those filesystem accesses explicitly — this is sensitive and the package install + plaintext credential storage deserve caution.
- Guidance
- This skill appears to do what it says (manage Microsoft Teams), but it performs sensitive local operations: the CLI will scan your Teams desktop app data directories and extract the skypetoken_asm cookie to authenticate, and it will store that token (plaintext) under ~/.config/agent-messenger/. Before installing, consider: 1) review the agent-messenger package source code (or vendor) to confirm how token extraction and storage are implemented; 2) be aware you may need to grant your terminal/full-disk access to read Teams data (macOS) which increases exposure; 3) storing tokens in plaintext means anyone with access to your user account could reuse them (though tokens expire in ~60–90 minutes); 4) if you have strict security/compliance needs, run this tool in an isolated environment or decline installation; 5) ask the publisher to update registry metadata to declare required config paths (Teams app data locations) so the access is explicit. If you want, I can list precise questions to ask the maintainer or suggest safer alternatives (official Microsoft Graph API integrations) that use managed API credentials instead of local cookie extraction.
Review Dimensions
- Purpose & Capability
- noteThe name/description (interact with Teams) align with the code and scripts: they call a CLI (agent-teams) that lists teams/channels, sends messages, monitors channels, etc. However, the SKILL.md and reference docs describe reading the Teams desktop app cookie DB (skypetoken_asm) and storing tokens locally — a legitimate but invasive technique that was not declared in the registry metadata (no required config paths).
- Instruction Scope
- concernRuntime instructions explicitly direct the agent/tool to locate and read Teams desktop app data directories and the Cookies SQLite DB on macOS/Linux/Windows, extract skypetoken_asm, and store tokens in ~/.config/agent-messenger/teams-credentials.json. The SKILL.md also instructs the agent to always read and sometimes overwrite a persistent memory file (~/.config/agent-messenger/MEMORY.md) at the start of every task. Those filesystem reads/writes go beyond the declared requirements and involve sensitive local tokens.
- Install Mechanism
- noteInstall spec is a Node package (agent-messenger) that creates the agent-teams binary. Installing an npm/Node package is a common approach; it is a moderate-risk install because it writes and runs third-party code on the host. No remote ad-hoc downloads or obscure URLs were present in the manifest.
- Credentials
- concernNo environment variables are requested, which is consistent, but the skill requires access to local Teams app data (Cookies DB) and will store tokens in plaintext at ~/.config/agent-messenger/teams-credentials.json (permissions 0600 recommended). That access to local credentials is sensitive and should be justified/explicitly declared in metadata; storing tokens in plaintext increases risk if the file or machine is compromised.
- Persistence & Privilege
- noteThe skill uses a per-user persistent memory file (~/.config/agent-messenger/MEMORY.md) for agent state; it does not declare an always:true privilege and does not modify other skills. Persisting IDs/aliases across sessions is reasonable for a messaging integration, but the instructions require the agent to read this file at the start of every task which gives the skill persistent context across agent runs.
