Skill flagged — suspicious patterns detected
ClawHub Security flagged this skill as suspicious. Review the scan results before using.
Buildertrend
v1.0.0Complete Buildertrend automation via Browser Relay - 43 playbooks covering sales, project management, financials, scheduling, change orders, daily logs, RFIs...
⭐ 0· 328·0 current·0 all-time
byKris Mj@elevateson
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
OpenClaw
Suspicious
medium confidencePurpose & Capability
The name/description say 'Buildertrend automation via Browser Relay' and the SKILL.md/STRATEGY.md explicitly require the 'browser' capability — this matches. No unrelated env vars, binaries, or install steps are requested; using browser automation for a product with no public API is reasonable.
Instruction Scope
The runtime instructions are detailed browser-automation playbooks that tell the agent to snapshot pages, click, type, evaluate JavaScript in the page, extract budget/clients/other fields, and save error screenshots to memory. That behavior is expected for UI automation, but there are two noteworthy inconsistencies: (1) README asserts 'JavaScript evaluation is limited to DOM click/query patterns (no data extraction)' while many playbooks explicitly 'extract' fields (budget, client lists, SOV values, etc.), and (2) some JS examples use broad selectors (querySelectorAll('*')) and text-based clicks which could be brittle and — if modified — could be used to read or click unintended elements. Users should audit the exact playbooks that read/submit financial data and confirm the inline approval steps are enforced before any financial action is sent.
Install Mechanism
Instruction-only skill with no install spec or external downloads. Nothing is written to disk by an installer as part of this skill bundle — lowest-risk install mechanism.
Credentials
The skill requests no environment variables or credentials (consistent with relying on the user's logged-in browser session). However, Phase 3 references integrations (QuickBooks Online, Google Drive, other 'agents') without declaring credentials — this implies reliance on pre-configured integrations or other agents to move data. Confirm how QBO/Drive integration is actually performed (separate agents, OAuth in your environment, or manual steps) before enabling workflows that push financial or client data.
Persistence & Privilege
always:false and no special system privileges requested. The skill can be invoked autonomously (platform default), which increases blast radius slightly, but that is normal for skills. It does not request permanent system presence or modify other skills' configs.
What to consider before installing
This skill is broadly coherent with its stated purpose (automating Buildertrend via OpenClaw's Browser Relay), but review the following before installing:
- Review playbooks that handle financial operations (POs, invoices, change orders). Ensure the UI/agent interaction includes explicit user approvals as claimed, and test on a non-production Buildertrend account first.
- The skill runs JavaScript in your browser context (evaluate steps). That is necessary for UI automation but also means the agent can read or manipulate page contents — only attach the Browser Relay tab when you explicitly trust the agent and the skill files. Do not attach tabs with other sensitive sites while testing.
- README has some contradictory statements (e.g., 'no data extraction' vs many playbooks that extract budget/client data). Expect data extraction for reporting/playbook outputs — confirm where that extracted data is stored or sent (memory, other agents, Google Drive) and that downstream integrations require their own credentials.
- Verify how integrations to QuickBooks/Google Drive are configured. The skill does not request QBO or Drive credentials, so ensure any necessary OAuth tokens are provided securely via the platform or separate agent, not implicitly by this skill.
- Because JS snippets use broad selectors in places, run the playbooks in a sandbox/test job first to validate they interact with the intended elements and to avoid accidental clicks on unrelated UI elements.
If you want higher assurance, ask the author for: (1) a clear description of where extracted data is stored/transmitted, (2) proof that every financial action includes an explicit user confirmation step, and (3) sanitized examples of the browser-evaluate payloads the agent will execute during key playbooks.Like a lobster shell, security has layers — review code before you run it.
latestvk975n4dc1smd2th7g83k2a3365824fxd
License
MIT-0
Free to use, modify, and redistribute. No attribution required.
