Back to skill
Skillv3.2.0

ClawScan security

business-flights · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousApr 24, 2026, 8:03 AM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill’s runtime instructions mostly match a flight-search tool that relies on a third‑party CLI, but there are mismatches and persistence/installation behaviors (global npm install, optional sudo, local logging of queries) that are unexplained and deserve caution before installing or running.
Guidance
This skill appears to be a CLI-driven flight search tool, but exercise caution before installing or running it: - The description claims Fliggy (Alibaba) but the runtime uses an unrelated CLI (flyai/@fly-ai/flyai-cli); ask the publisher for source/homepage and proof of data provider if you need trust guarantees. - The skill’s instructions may prompt the agent to run npm i -g (and possibly sudo), which installs third-party code globally — verify the npm package identity and audit its repository before allowing installation. - The runbook may append user queries and CLI results to a local file (.flyai-execution-log.json). If you don’t want travel dates, routes, or other inputs stored on disk, block filesystem writes or inspect/clean the log file after use. - Because the metadata lacks an official install spec and homepage, prefer manual review: if you decide to use it, run the npm install yourself (not via an automated agent), inspect the package, and run the CLI in a controlled environment. If you want higher confidence, ask the skill publisher for: the flyai CLI homepage/repository link, clarification about the Fliggy claim, and an explicit disclosure of what the execution log contains and where it’s stored.

Review Dimensions

Purpose & Capability
concernThe skill claims to be “powered by Fliggy (Alibaba Group)” in the description but the runtime requires a different CLI (flyai / @fly-ai/flyai-cli). No homepage or source is provided to reconcile this. Asking the agent to use a third‑party CLI is plausible for a live flight search, but the Fliggy vs flyai discrepancy and lack of upstream provenance (no homepage/source) are inconsistent and unexplained.
Instruction Scope
concernSKILL.md tightly constrains behavior to calling flyai CLI and formatting its JSON output, which is appropriate for a CLI-driven skill. However the instructions also mandate local logging (runbook) and require installing the CLI if missing (including sudo fallback). The runbook instructs writing full request logs (including raw user_query) to .flyai-execution-log.json if filesystem writes are available — that persists user input locally and may include sensitive data. The install-and-retry loop and requirement to always use the CLI (never answer from training data) are operationally strict and could cause the agent to attempt network installs automatically.
Install Mechanism
concernRegistry metadata contains no install spec, but SKILL.md instructs installing the CLI via npm i -g @fly-ai/flyai-cli (and even suggests sudo). Installing a global npm package is a real but non-trivial action (downloads and executes third-party code, may require elevated privileges). This is a moderate-risk install path and the skill does not document the package’s origin or verify integrity. The absence of an official install spec in the metadata is an inconsistency.
Credentials
noteThe skill requests no environment variables or credentials, which is proportional for a read-only flight search. Positive: it does not ask for unrelated secrets. Caveat: the runbook log may capture and persist user queries and CLI results to disk, creating a local store of potentially sensitive information (travel dates, routes, possibly PII) without declaring that persistence in the skill metadata.
Persistence & Privilege
noteThe skill is not marked always:true and does not request special agent privileges. However, SKILL.md explicitly instructs writing an execution log file (.flyai-execution-log.json) when filesystem writes are available. That creates local persistence of user queries/commands; it’s not inherently malicious but is a lasting side-effect that should be disclosed to users and may require permission.