4to1 Planner Bak

PassAudited by VirusTotal on May 5, 2026.

Overview

Type: OpenClaw Skill Name: 4to1-planner-bak Version: 1.0.0 The skill provides a comprehensive planning system but relies on high-risk capabilities, including shell command execution (curl, grep), local filesystem access for configuration (~/.config/4to1/), and the handling of sensitive API keys for Notion and Todoist. While these actions in SKILL.md and scripts/setup.sh are aligned with the stated purpose of a cross-platform planning coach, the use of raw shell commands to manage credentials and perform network operations meets the criteria for a 'suspicious' classification due to the inherent risk of these capabilities.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

You may be trusting a copied, backup, or mispackaged skill with access to planning accounts.

Why it was flagged

The internal package metadata identifies a different slug, owner, and version than the registry entry under review, which is a provenance mismatch for a skill that asks users to provide account tokens.

Skill content
"ownerId": "kn7cdmnd107s52ptc87503mzyd80xyv7", "slug": "4to1-planner", "version": "2.0.0"
Recommendation

Verify the publisher and package provenance before entering API tokens; the registry metadata and packaged metadata should be aligned.

What this means

The Google Calendar path appears incomplete or unreviewable from the provided artifacts.

Why it was flagged

The Google Calendar OAuth setup points to gcal_setup.py, but that file is not included in the supplied file manifest.

Skill content
echo "   python3 $(dirname $0)/gcal_setup.py"
Recommendation

Do not fetch or run an outside OAuth helper unless you can verify its source; the package should include the referenced helper or remove the instruction.

What this means

Anyone or anything that can read the config file may be able to use your Notion or Todoist access.

Why it was flagged

The setup flow asks for provider API tokens and saves them locally in plaintext. This is expected for the integrations, but it is sensitive authority.

Skill content
read -p "Paste your Notion API key: " notion_key
echo "NOTION_API_KEY=$notion_key" >> "$CONFIG_DIR/config"
Recommendation

Use the narrowest possible provider token, share only the needed Notion page, protect the config file permissions, and avoid entering credentials until you trust the package.

What this means

If the config file is corrupted or tampered with, running the status script could execute unintended commands on your machine.

Why it was flagged

The status script executes the local config file as shell code instead of safely parsing key/value settings.

Skill content
source "$CONFIG"
Recommendation

Replace shell sourcing with safe config parsing and ensure the config file is created with restrictive permissions.

What this means

The skill can create or update planning structures in your connected tools.

Why it was flagged

The skill documents direct API calls that create pages and databases in Notion. This is purpose-aligned but modifies a third-party workspace.

Skill content
curl -s -X POST "https://api.notion.com/v1/pages"
Recommendation

Confirm the target page, project, or calendar before allowing setup or review actions to write changes.

What this means

Personal planning history may be read and reused during future agent conversations.

Why it was flagged

The weekly review flow reuses persistent planning data from the configured backend, which can include personal goals, habits, and reflections.

Skill content
From the configured backend, pull:
- Current 2-week sprint tasks and completion status
- Active 3-month milestone progress
- Last review
Recommendation

Use a dedicated workspace or local directory for this planner, and avoid storing sensitive personal information you do not want the agent to process.