Agentic Workflow Designer
PassAudited by ClawScan on May 16, 2026.
Overview
This is an instruction-only workflow design skill with no installed code or required credentials, but its generated automation designs could later act on business systems if the user implements them.
This skill appears safe to install as an instruction-only design assistant. Before deploying any generated n8n/Make/Zapier or agent workflow, review the triggers, credentials, write actions, human-approval gates, logging, and memory/storage settings.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A generated workflow could perform business actions if the user deploys it without review.
The skill may produce importable automation specifications. This is purpose-aligned, but such specs could trigger real actions if imported into an automation platform.
**Generate Workflow Specs** — Produce JSON/YAML specs importable into n8n or Make
Review generated workflow specs before importing or enabling them, especially triggers, tool calls, retries, and any write actions.
If a generated workflow is deployed with broad credentials, it could send emails or modify CRM records.
The example workflow would require delegated access to email and CRM systems if implemented. The skill does not request credentials itself, but downstream workflows may need sensitive account permissions.
Outreach Agent [Email API + CRM API] → Personalized email + CRM update
Use least-privilege API keys or OAuth scopes, test in a sandbox, and require approval before enabling production write access.
Implemented workflows may store lead history, process data, or other business context for later reuse.
The skill recommends memory/storage patterns for designed workflows. Persistent memory is expected for this use case but can retain business data if implemented.
🧠 Memory: [ephemeral / Redis / vector DB]
Define what data can be stored, where it is stored, how long it is retained, and who or what agents can read it.
