Oganim Deploy

WarnAudited by ClawScan on May 16, 2026.

Overview

This deploy helper is not clearly malicious, but it gives the agent production deployment, database superuser, and account-administration powers without enough declared credential scope or approval guardrails.

Install this only if you control the referenced Vercel/Supabase project and are comfortable giving the agent production deploy, database-admin, and auth-admin abilities. Before use, restrict credentials to the intended project, require explicit approval for production deploys/migrations/account changes, prefer staging or test accounts for Playwright recipes, and pin any setup dependencies.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If installed in an environment with these files, the agent could use production deployment and database-admin credentials.

Why it was flagged

The skill instructs the agent to read local production credentials and use Supabase postgres superuser access, while the registry metadata declares no required credentials or config paths.

Skill content
VERCEL_TOKEN=$(cat ~/.openclaw/credentials/vercel/token) \
  npx vercel deploy --prod --yes ... The runner connects to the Supabase pooler as the `postgres` superuser using credentials from `~/.openclaw/credentials/supabase/credentials.env`.
Recommendation

Declare required credentials explicitly, use least-privilege tokens, scope them to the intended project, and require user confirmation before any production deploy or database migration.

What this means

A mistaken or premature agent action could ship broken code or alter a live database.

Why it was flagged

The documented workflow uses non-interactive production deployment and database migration commands, but does not define an approval gate, staging requirement, rollback plan, or bounded set of safe changes.

Skill content
npx vercel deploy --prod --yes ... node deploy/run-migration.cjs deploy/migration-stageN-<topic>.sql
Recommendation

Add explicit instructions to ask the user before production deploys or migrations, prefer dry-run/staging verification, and document rollback/recovery steps.

What this means

Testing could disrupt customer access or leave account state changed if cleanup fails.

Why it was flagged

The verification recipe mutates a real customer authentication record and acknowledges that the customer may need a password reset afterward, which can affect live users if run on production.

Skill content
await fetch(`${cred.SUPABASE_URL}/auth/v1/admin/users/${USER_ID}`, { method: 'PUT' ... body: JSON.stringify({ password: TEMP_PASS }) ... }); ... (After this, the customer must request a password reset to log in again.)
Recommendation

Run these recipes only against test accounts or staging projects, require explicit user approval for live-account changes, and add verified cleanup checks.

What this means

Running the setup script pulls code from npm into the local test directory.

Why it was flagged

The setup helper installs Playwright from npm without a pinned version or lockfile. This is aligned with the browser-verification purpose and is not automatic, but it depends on external package provenance.

Skill content
npm i playwright --no-save
Recommendation

Pin Playwright to a known version and checksum or use a project lockfile if reproducibility is important.

What this means

Screenshots from live admin or customer pages could include private data visible to the assistant tooling.

Why it was flagged

The recipe intentionally moves screenshots into the assistant-readable workspace for image analysis; if screenshots contain CRM or portal data, they may expose sensitive customer information to the analysis tool/context.

Skill content
cp /tmp/oganim-test/foo.png ~/.openclaw/workspace/foo.png
# Then: tool call → image(path=~/.openclaw/workspace/foo.png, prompt="...")
Recommendation

Use redacted screenshots where possible, avoid capturing real customer data, and delete workspace artifacts after review.