Api Endpoint Discovery

PassAudited by ClawScan on May 10, 2026.

Overview

The visible artifacts match a disclosed API endpoint scanner, but it can actively probe websites and has licensing/provenance details users should verify.

Only run this scanner on APIs you own or are authorized to test. Before installing, review the full endpoint_discovery.py source, confirm the install path, and verify EdgeIQ pricing/licensing terms if you plan to use paid features.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Running it against a site you do not own or have permission to test could violate terms of service or laws, and active probing may generate noticeable traffic.

Why it was flagged

The skill is designed to send discovery and brute-force probes to a user-supplied target. This is disclosed and purpose-aligned, but it can create legal or operational risk if used on unauthorized systems.

Skill content
active techniques (path brute-forcing, parameter enumeration)... Only audit domains you own or have explicit written authorization to scan.
Recommendation

Use it only for domains where you have explicit authorization, and keep thread counts and wordlists appropriate for the target.

What this means

The skill may read local licensing information or an email address if you set those values, even though the registry metadata does not declare them.

Why it was flagged

The registry metadata says there are no required credentials or environment variables, but the code reads a local license key file and EDGEIQ email/license environment variables for paid-feature checks.

Skill content
LICENSE_FILE = Path.home() / ".edgeiq" / "license.key"... env_key = os.environ.get("EDGEIQ_LICENSE_KEY", "").strip()... email = os.environ.get("EDGEIQ_EMAIL", "").strip().lower()
Recommendation

Review what you place in ~/.edgeiq/license.key and EDGEIQ_* environment variables; do not store unrelated secrets there.

What this means

Installation may fail or may copy whatever happens to exist at that local path if a user adapts it without checking.

Why it was flagged

The install instruction copies from a hard-coded local developer-style path rather than a reproducible package source. This is not malicious by itself, but users should verify what directory they are installing from.

Skill content
cp -r /home/guy/.openclaw/workspace/apps/api-endpoint-discovery ~/.openclaw/skills/api-endpoint-discovery
Recommendation

Install only from a trusted, reviewed copy of the skill and confirm the source directory before copying files into ~/.openclaw/skills.

What this means

The visible portions look aligned with the stated purpose, but unshown code could not be reviewed here.

Why it was flagged

The largest implementation file is not fully visible in the supplied artifact, so this review cannot fully verify all runtime behavior from the provided source text.

Skill content
"truncated": true
Recommendation

Review the complete endpoint_discovery.py file before installing or running the skill.

What this means

A user may be confused about which payment link or price applies before upgrading.

Why it was flagged

The in-code upgrade message shows different pricing from the SKILL.md description, which advertises Lifetime $39 and Optional Monthly $7. The purchase flow is manual, but pricing terms are inconsistent.

Skill content
Pro ($9/mo):   https://buy.stripe.com/28EbJ3gKv7hb3jS2cg7wA03... Bundle ($39/mo): https://buy.stripe.com/aFabJ3am79pjg6E18c7wA02
Recommendation

Verify pricing and licensing terms with the publisher before paying for Pro, Bundle, or Lifetime access.