cross-ref

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

The skill’s GitHub cross-reference purpose is coherent, but it can use your GitHub account for bulk public repo actions and explicitly tries to make automated commenting look human to avoid GitHub abuse detection.

Only install or run this if you are comfortable with it using your GitHub account. Keep it in plan/dry-run mode first, manually inspect every proposed comment/action, avoid use on repos you do not administer, and use a least-privilege GitHub credential. Be especially cautious of the abuse-detection-evasion rate limiting language.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using this could put the user's GitHub account or repository reputation at risk and may violate platform anti-abuse expectations.

Why it was flagged

This explicitly frames the automation as human-looking and intended to avoid GitHub abuse detection, which is materially different from ordinary transparent rate limiting.

Skill content
posts with organic-looking rate limiting — jittered intervals, breathing pauses, exponential backoff. Everything is designed to not trigger GitHub's abuse detection.
Recommendation

Do not use abuse-detection evasion or human-mimicking posting. Prefer transparent, conservative rate limits, respect platform responses, and avoid automated commenting on repos where you lack explicit permission.

What this means

If the approved comment list is wrong or too broad, the skill can publish many misleading comments under the user's GitHub identity.

Why it was flagged

The script loops through an approved-comments file and posts each item to GitHub via the raw API, creating public side effects without an interactive confirmation inside the script.

Skill content
for ((i=START_INDEX; i<TOTAL; i++)); do ... gh api "repos/$REPO/issues/$ISSUE_NUM/comments" -f body="$BODY"
Recommendation

Run only in dry-run/plan mode first, inspect the exact approved-comments file, require explicit per-item or small-batch approval, and avoid automated close/label actions unless manually verified.

What this means

The skill can act with the user's GitHub permissions, potentially across repositories covered by that credential.

Why it was flagged

The skill needs the user's local GitHub authentication with broad repo permissions, while the registry metadata declares no primary credential.

Skill content
- `gh` CLI authenticated with `repo` scope
Recommendation

Use a least-privilege GitHub token or account, restrict execution to repositories you administer, and require the skill metadata to declare its GitHub credential and write capabilities.

What this means

Users may not realize before installation that local scripts and GitHub CLI authentication are needed.

Why it was flagged

The registry/provenance and requirement declarations are incomplete even though the artifacts include shell scripts and the README documents GitHub CLI and jq requirements.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill; Required binaries ... none; Primary credential: none
Recommendation

Declare required binaries, credential needs, and a verifiable source/homepage in the skill metadata.

What this means

Private issue titles, PR metadata, and body snippets may be processed in multiple model contexts.

Why it was flagged

The design sends repository PR and issue data to multiple model subagents; this is central to the skill but may include private repository information.

Skill content
Spawns parallel Sonnet subagents ... Each subagent receives: Its batch of PRs ... The complete issue index ... The complete PR index
Recommendation

Use only with repositories whose data you are allowed to send to the configured model provider, and start with smaller counts or sanitized data for sensitive repos.