Back to skill
Skillv1.0.2
ClawScan security
CopilotKit-agent-patterns · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
BenignFeb 27, 2026, 5:47 AM
- Verdict
- Benign
- Confidence
- high
- Model
- gpt-5-mini
- Summary
- This is an instruction-only guidance pack for CopilotKit agent integration; its files, examples, and requested resources are coherent with the stated purpose and nothing in the bundle attempts unexplained access or downloads.
- Guidance
- This is a documentation-only skill containing architecture and protocol patterns for CopilotKit agents — it doesn't install code or ask for credentials. The examples do show how to use MCP endpoints and environment variables (MCP_API_KEY, MODEL_TIER), which is expected: if you reuse the snippets, ensure API keys are stored securely and endpoints are trusted. Before copying example config into production, review any MCP endpoints you connect to and avoid pasting secrets into prompts or public places.
Review Dimensions
- Purpose & Capability
- okThe name/description (CopilotKit agent patterns) match the contents: a set of rules and examples for AG-UI, BuiltInAgent, state management, HITL, and generative UI. There are no unrelated environment variables, binaries, or install steps required by the skill itself.
- Instruction Scope
- okSKILL.md and the rule files only contain architecture and implementation guidance with in-repo example snippets. There are no instructions to read arbitrary host files, send data to unexpected external endpoints, or exfiltrate secrets. Example code references typical runtime behavior (emitting events, configuring endpoints) appropriate to the purpose.
- Install Mechanism
- okNo install spec or code is present; this is instruction-only so nothing is downloaded or written to disk by the skill itself.
- Credentials
- noteThe repository uses environment variables in example code (e.g., process.env.MCP_API_KEY, MODEL_TIER) and shows example external endpoints, but the skill does not require any env vars. This is reasonable for documentation/examples, but when implementing these patterns users will need to supply relevant keys — treat those as sensitive and provide them only to trusted runtimes.
- Persistence & Privilege
- okThe skill is not always-enabled and is user-invocable (defaults). It does not request persistent system privileges, nor does it modify other skills or system-wide configs.
