Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Firebase Auth Setup

v0.1.2

Configures Firebase Authentication — providers, security rules, custom claims, and React auth hooks

0· 662·0 current·0 all-time
byGuilherme Favaron@guifav
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Benign
View report →
OpenClawOpenClaw
Suspicious
medium confidence
!
Purpose & Capability
The SKILL.md describes Firebase auth setup, provider hooks, middleware, and a Firebase→Supabase sync — which legitimately may require Firebase admin credentials and a Supabase service role key. However, the registry metadata provided to you at the top lists no required env vars or binaries, while claw.json (bundled with the skill) declares many required env vars (including FIREBASE_PRIVATE_KEY and SUPABASE_SERVICE_ROLE_KEY) and required binaries (node, npx). This mismatch is an incoherence: either the skill genuinely needs these sensitive creds/binaries or the manifest is stale/incorrect.
Instruction Scope
The SKILL.md itself is conservative: it mandates a planning protocol, tells the agent to inspect project files (src/lib/firebase, hooks, middleware, .env.example) and explicitly instructs not to read .env.local or any file containing actual credential values. It also asks to 'test end-to-end if possible', which is vague and could imply needing live credentials. Overall the runtime instructions stay within the auth setup scope but leave room for ambiguous actions when credentials are required.
Install Mechanism
This is an instruction-only skill with no install spec and no code files to execute, which is low-risk from an installer perspective. There is no remote download or arbitrary code execution specified in the manifest.
!
Credentials
The claw.json lists multiple highly sensitive environment variables (FIREBASE_PRIVATE_KEY, FIREBASE_CLIENT_EMAIL, SUPABASE_SERVICE_ROLE_KEY, etc.). Those are proportionate to implementing server-side Firebase Admin verification and Supabase service operations, but the earlier provided 'Requirements' block claimed none. Requesting multiple production-level credentials without a clear, consistent declaration is concerning. Also 'NEXT_PUBLIC_*' vars are public, but private keys should be handled carefully — the skill's instructions try to avoid reading actual credential files, but the manifest suggests these secrets may be needed for testing or verification.
Persistence & Privilege
The skill is not always-enabled and is user-invocable, which is normal. claw.json includes a filesystem permission (expected for a skill that will create/modify project files). There is no evidence the skill attempts to persist beyond its own files or modify other skills or global agent settings.
What to consider before installing
This skill's code-free instructions look reasonable for configuring Firebase auth and a Firebase→Supabase sync, but there are important inconsistencies you should resolve before installing or running it: - Confirm required secrets: claw.json declares FIREBASE_PRIVATE_KEY and SUPABASE_SERVICE_ROLE_KEY (highly sensitive). Ask the author why these are required and whether they are mandatory for the skill to run or only needed for optional end-to-end tests. Prefer to provide such keys manually and only in a development environment. - Verify the manifest vs registry metadata: the top-level Requirements showed no required env vars or binaries, but claw.json does. That mismatch could be a packaging error or intentional—get clarification. - Inspect any created API routes before deploying: the SKILL.md will add server-side routes that operate with service credentials. Review those routes for authorization checks, rate limiting, and whether they leak tokens or accept unauthenticated requests. - Follow the Planning Protocol locally and run changes in a feature branch or staging environment. Back up existing auth-related files and test lockout scenarios (middleware changes) on a non-production environment. - If you need higher assurance, request the skill author to provide a minimal proof (diff or example files) showing how credentials are consumed (e.g., using process.env only in server-only code, not client bundles), and whether any remote endpoints are contacted besides Firebase and Supabase. If the author confirms claw.json is accurate and requires the listed creds, treat those as required for full functionality and only supply them in controlled, auditable environments (or create short-lived test credentials). If they cannot justify the sensitive envs or cannot explain the registry/manifest mismatch, do not install the skill.

Like a lobster shell, security has layers — review code before you run it.

latestvk9765ac1ahxj00j0q5g64a8wpd83f7xm

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments