Back to skill
Skillv1.0.0
ClawScan security
Abstract Searcher · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 15, 2026, 5:15 PM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill's code and APIs match its stated purpose, but the runtime instructions ask the agent to control your real Chrome session and use OS automation (mac-control), which can access private/authenticated data and is not declared or constrained — this mismatch raises privacy and scope concerns.
- Guidance
- This skill mostly does what it says when using public APIs, but the SKILL.md asks the agent to control your real Chrome session and potentially use OS automation (mac-control) to scrape paywalled pages. Before installing or enabling it: (1) consider running the Python script manually in a local terminal rather than allowing the agent to drive your browser; (2) avoid giving the agent access to your Chrome profile or to any OS automation tools unless you trust it; (3) if you must allow browser fallback, inspect and limit the browser-relay/tooling permissions and run in a separate browser/profile without sensitive logins; (4) review the script yourself (it uses only listed public APIs) and monitor network activity to ensure it only contacts the stated endpoints.
Review Dimensions
- Purpose & Capability
- okName and description match the included Python script and the listed APIs (arXiv, Semantic Scholar, CrossRef, OpenAlex). The network calls in scripts/add_abstracts.py are consistent with fetching abstracts.
- Instruction Scope
- concernSKILL.md explicitly instructs the agent to attach to a real Chrome profile, use a browser relay to snapshot pages, click results, and (optionally) use 'mac-control' to auto-click a toolbar icon. Those instructions grant access to any content in the user's Chrome (cookies, logged-in sessions, institutional access) and to OS-level automation, which is broader than simply querying APIs and could expose private data; the skill does not declare or limit this access.
- Install Mechanism
- okNo install spec; the skill is instruction-plus-a-script only. That minimizes disk-install risk — the Python script runs locally and makes direct API calls.
- Credentials
- noteThe skill requests no environment variables or credentials (scripts use only public APIs). However, the browser fallback relies on the user's Chrome profile and OS automation to access paywalled pages — this implicitly leverages credentials/cookies stored in the browser even though no creds are declared.
- Persistence & Privilege
- okalways:false and no special persistence requested. The skill does not modify other skills or system-wide settings (based on provided files). Autonomous invocation is the platform default but is not combined here with other high privileges.
