Joan Workflow
Analysis
This is a coherent instruction-only Joan workflow guide, with only purpose-aligned cautions around account access, shared workspace changes, and persistent AI context files.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`joan pod push` ... `joan todo update <id>` ... `joan todo archive <id>` ... `joan plan push <todo-id>`
The documented Joan CLI workflows include actions that can update, archive, or push workspace content to a server. This is clearly related to Joan workflow management, but it can affect shared data.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
The MCP server uses OAuth 2.1 authentication. Authenticate via the CLI first with `joan auth login`.
The skill discloses OAuth-based Joan account authentication. This is expected for accessing a user’s Joan workspaces, but it gives the Joan CLI/MCP integration delegated account access.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`joan context claude` ... Generate CLAUDE.md with Joan context
The skill documents generating a persistent CLAUDE.md file from Joan context. This is purpose-aligned, but content placed in an AI context file can influence later assistant behavior.
Joan provides an MCP server at `https://joan.land/mcp/joan` with tools: `list_workspaces`, `list_pods`, `get_pod`.
The skill discloses an external MCP server that can list workspaces and retrieve pod content. This is coherent with the Joan workflow, but it creates an external tool boundary for workspace data.
