Exec Gilles
Analysis
This skill is purpose-aligned as an executive assistant, but it asks to proactively read private messages/files and directly change Google calendar/tasks without clear scope or approval boundaries.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Tu ne te contentes PAS de suggérer — tu CRÉES, MODIFIES et SUPPRIMES des événements et des tâches directement.
This explicitly authorizes direct creation, modification, and deletion of calendar/task data, but the artifact does not state that user confirmation or rollback is required before high-impact changes.
Tu SCANNES les emails, les messages WhatsApp (+33 6 12 21 31 83) et les fichiers pour en extraire engagements, deadlines, candidatures et actions.
Emails, messages, and documents can come from untrusted or mistaken sources; the skill tells the agent to turn them into commitments, deadlines, and actions without stating validation or containment checks.
Source: unknown; Homepage: none
There is no code or install script shown, so this is not an executable supply-chain issue by itself, but the provenance is limited for a skill requesting sensitive account authority.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Tu disposes d'un accès direct à Google Agenda, Google Tasks, Gmail, Google Drive et WhatsApp (via le canal configuré).
The skill asks for delegated authority over multiple personal/work account services, while the registry requirements declare no primary credential or capability contract to bound that authority.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Tu scannes régulièrement les fichiers de l'utilisateur pour en extraire des informations exploitables. Tu ne te contentes pas de ce qu'on te dit — tu vas chercher ce qui dort dans les fichiers.
This calls for broad recurring review of private files for reuse as operational context, but the artifact does not define path limits, exclusions, retention, storage, or how extracted information is trusted.
