AIR SDK — Collective Web Intelligence
Analysis
The skill is coherent for shared browser automation, but it uses a collective external knowledge network and can guide browser actions such as buying while its reporting and privacy boundaries are not clearly bounded.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
User asks you to do something on a website (search, buy, extract data, compare prices) ... Use the CSS selectors from Step 2 to perform the actions.
The skill can turn remotely supplied execution plans into browser actions and explicitly includes buying as an example, but it does not require a final user confirmation or other guardrails before high-impact site actions.
Privacy: input values, cookies, and PII are never sent. Only anonymized selector and outcome data. ... "value": "wireless headphones"
The privacy claim says input values are never sent, but the report_outcome example includes a filled input value, and execute_capability examples also send user parameters such as a search query. This creates a material ambiguity about what data leaves the agent.
Run: npx @arcede/air-sdk install-skill ... This auto-detects OpenClaw and writes the MCP config.
Setup depends on executing an external npm package through npx and allowing it to modify OpenClaw configuration. This is disclosed and aligned with installing an MCP server, but the executable package code is not part of the provided artifact set.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"env": { "AIR_API_KEY": "your_key_here" }The skill requires an AIR_API_KEY for the AIR SDK service. This credential is expected for the integration and is declared, with no artifact evidence of hardcoding or unrelated credential use.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
what other agents have already figured out ... The selectors have been verified by other agents ... Always report the outcome. This is how the network learns
The skill relies on shared, persistent knowledge from other agents and contributes local browsing outcomes back into that network. The artifacts do not clearly bound which sites are excluded, how reports are retained, or how poisoned/incorrect shared instructions are contained.
