PocketLens

PassAudited by VirusTotal on May 12, 2026.

Overview

Type: OpenClaw Skill Name: pocketlens Version: 1.0.0 The skill presents a potential shell injection vulnerability in `SKILL.md` when instructing the AI agent to execute `node pocket-lens.mjs create-transaction '<JSON>'`. The JSON argument is constructed from potentially untrusted input (vision AI output or user messages). While the `SKILL.md` attempts to guide the agent to quote the JSON, and the `pocket-lens.mjs` script uses `JSON.parse()` (which is safe for JSON parsing), the intermediate step of passing an unvalidated, AI-generated string to a shell command is a known attack vector if the agent fails to properly escape shell metacharacters within the JSON string, potentially leading to arbitrary command execution.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A misread receipt, a screenshot shared for another reason, or an incorrect Vision extraction could create unintended or inaccurate financial records in the user’s PocketLens account.

Why it was flagged

The skill directs the agent to turn payment-looking images into API write operations, including multiple transactions, without requiring the user to review and approve the extracted merchant, amount, date, or category first.

Skill content
When a user sends an image that appears to be a receipt, credit card statement, bank notification, or any payment-related screenshot ... For each parsed transaction, call the PocketLens API using the helper script: node pocket-lens.mjs create-transaction '<JSON>'
Recommendation

Require a confirm-before-create flow: show the extracted transactions and total, wait for explicit user approval, and ideally create them as pending or provide an undo path.

What this means

If the API key is leaked or misused, someone may be able to create or access financial records depending on the key’s permissions.

Why it was flagged

The skill expects a credential that can mutate the user’s PocketLens account, and the documentation allows a full-permission key even though least privilege is safer.

Skill content
Set the permission to **write** (or **full**).
Recommendation

Use the least-privileged PocketLens key that supports the needed operations, avoid full permission unless truly required, and rotate the key if it may have been exposed.

What this means

Uploaded images may contain personal financial details beyond the transaction being recorded, and those details may be visible to the model/tooling and PocketLens service.

Why it was flagged

Sensitive receipt, card-statement, and banking screenshot data is processed through a Vision AI/tool flow and then sent to PocketLens. This is the advertised function, but it involves sensitive financial information crossing service boundaries.

Skill content
The assistant will: 1. Analyze the image using Vision AI. 2. Extract merchant name, amount, date, and card info. 3. Submit the transactions to PocketLens.
Recommendation

Only upload images you intend to process, crop or redact unrelated details where possible, and review PocketLens/OpenClaw data handling policies.