company-search

PassAudited by ClawScan on May 1, 2026.

Overview

This looks like a coherent company-research skill that uses public web search/fetching, with some disclosed but important operational notes around shell fallback, optional third-party fetch proxies, and unpinned package setup.

This skill appears reasonable for public company research. Before installing, be aware that the local fallback may run Python commands, optional setup installs third-party Python packages, and non-direct fetch modes can send public URLs/page content through external services. Use an isolated environment and avoid using proxy fetch modes for private or internal pages.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If enabled in an agent with shell access, the skill may run local Python commands to perform web searches or fetch pages.

Why it was flagged

The skill can fall back to shell-style execution of the bundled helper script when dedicated search/fetch tools are unavailable. This is disclosed and scoped to the local search_fetch.py workflow, but it still gives the agent a more powerful execution path than a pure instruction-only skill.

Skill content
`bash` / `run_python` / shell 调用本地脚本
Recommendation

Allow shell fallback only when needed, keep it restricted to the bundled script, and review unusual commands before approving them.

What this means

A future dependency release could behave differently from the version originally intended by the skill author.

Why it was flagged

The optional setup installs unpinned Python packages. These dependencies are purpose-aligned for search, HTTP requests, parsing, and extraction, but unpinned installs can change over time.

Skill content
"setup": "pip install ddgs requests beautifulsoup4 lxml trafilatura"
Recommendation

Install in an isolated environment and consider pinning or reviewing dependency versions before use.

What this means

If non-direct fetch strategies are used, public URLs and retrieved content may be visible to third-party services.

Why it was flagged

The helper can optionally route fetches through third-party services. The artifact clearly discloses this data flow and warns against sensitive/internal URLs, making it a purpose-aligned privacy note rather than a hidden exfiltration concern.

Skill content
"jina" / "archive" / "auto-fallback": the target URL (and response content) passes through r.jina.ai or archive.org. Do NOT use these strategies for sensitive or internal URLs.
Recommendation

Use the default direct mode for ordinary fetching, and only use Jina or Archive for public pages that are acceptable to route through those services.