Drata
Analysis
This appears to be a Drata/Membrane integration, but it requests sensitive OAuth-style access and describes broad management of compliance data without clear action limits.
Findings (5)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Manage Controls, Standards, Objectives, Reports, Persons, Risks and more.
The skill describes broad management authority over Drata objects, but the artifacts do not define approval gates, read-only defaults, write limits, or rollback expectations for high-impact operations.
Source: unknown
The skill has no install code or dependencies, but the listed source is unknown, so publisher/provenance should be verified before granting sensitive integration access.
Control ... Report ... Vendor ... Risk ... Service Account ... Key ... Access Request ... Change Request
The listed Drata object types include organization-wide compliance, access, vendor, risk, and account-security records; changes to these records can affect audits, reporting, workflows, and teams if not contained.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Primary credential: none ... Capability signals: requires-oauth-token; requires-sensitive-credentials
The credential contract is inconsistent: requirements do not declare a primary credential, while capability signals indicate OAuth and sensitive credentials are required.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
compatibility: Requires network access and a valid Membrane account
The skill relies on an external networked Membrane account for a Drata integration, so users should understand the provider and data boundary for sensitive compliance data.
