Apify Runner
Analysis
The skill is transparent about using Apify, but it can automatically select and run arbitrary Apify actors with the user's token, which can affect account usage, costs, and scraping scope.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Pick the top-ranked candidate... Step 6: Full Execution ... --batch-size 50 ... --probe
The instructions allow the agent to select an Apify actor and proceed to full batched execution. This is purpose-aligned, but there is no explicit final approval, total item cap, or cost guard before launching remote actor runs.
web_fetch https://apify.com/{actor_id}.md ... Read the input schema section ... Sensible defaults from the documentationThe workflow relies on externally fetched actor documentation to shape the run input. Actor documentation can contain untrusted text, and the artifact does not tell the agent to treat non-schema instructions as untrusted.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
`APIFY_TOKEN` env var, or a `config.json` with tokens ... `--token` flag ... `config.json` tokens map ... `APIFY_TOKEN` env var
The skill clearly uses an Apify credential, which is expected for this integration, but the registry metadata does not declare a primary credential or required environment variable.
