Back to skill
Skillv1.0.12

ClawScan security

Gws Workflow Standup Report · ClawHub's context-aware review of the artifact, metadata, and declared behavior.

Scanner verdict

SuspiciousMar 31, 2026, 6:35 PM
Verdict
suspicious
Confidence
medium
Model
gpt-5-mini
Summary
The skill's purpose (produce a standup summary via the gws CLI) is plausible, but it references an external shared SKILL.md for authentication and global flags without declaring that dependency or any credentials — this mismatch is concerning and deserves verification before use.
Guidance
This skill likely calls the 'gws' CLI to read your calendar and tasks, which is reasonable for a standup report — but it refers to a ../gws-shared/SKILL.md for auth without declaring any credentials. Before installing: (1) locate and inspect the gws-shared SKILL.md the skill references to see where credentials live and what global flags it sets; (2) confirm the provenance and integrity of the 'gws' CLI (how it was installed, vendor, version); (3) verify that any credentials/config are stored in a place you trust and that the shared SKILL.md doesn't expose secrets; (4) run the command in a restricted/test account or isolated environment first to confirm the tool is truly read-only. If you cannot find or review the referenced gws-shared file, treat the skill as untrusted.

Review Dimensions

Purpose & Capability
concernThe declared requirement (binary 'gws') matches the stated purpose (a gws workflow command). However, the skill references ../gws-shared/SKILL.md for auth/global flags but does not declare any dependency on that shared skill or any required environment variables/credentials. A skill that needs access to calendar/tasks will require credentials; not declaring them is an inconsistency.
Instruction Scope
concernThe runtime instructions explicitly tell the agent to 'Read ../gws-shared/SKILL.md for auth, global flags, and security rules' — that asks the agent to read a file outside the skill's own directory (potentially containing sensitive config/credentials). While the command-run instructions themselves are narrow (invoke 'gws workflow +standup-report'), the cross-skill file read is scope creep and could expose or rely on secrets not declared here.
Install Mechanism
okThis is an instruction-only skill with no install spec; it only requires the 'gws' binary to exist. That is low-risk from an installation perspective, provided 'gws' itself is trusted and properly installed.
Credentials
concernNo environment variables or primary credential are declared, yet the skill implicitly depends on authentication described in a separate 'gws-shared' SKILL.md. This omission is disproportionate: calendar/task access normally requires credentials, and those are not surfaced here.
Persistence & Privilege
notealways is false and the skill is not marked to auto-enable globally. It can be invoked autonomously (platform default), which is expected. The main concern is that it references external config (gws-shared) rather than requesting persistent privileges itself.