Skill flagged — suspicious patterns detected

ClawHub Security flagged this skill as suspicious. Review the scan results before using.

Qa Gate Vercel

v0.1.1

Pre-production validation gate for Vercel/Supabase/Firebase stack — generates test plans, executes test suites, validates APIs, UI, toasts, LLM output qualit...

0· 367·0 current·0 all-time
byGuilherme Favaron@guifav
MIT-0
Download zip
LicenseMIT-0 · Free to use, modify, and redistribute. No attribution required.
Security Scan
VirusTotalVirusTotal
Suspicious
View report →
OpenClawOpenClaw
Suspicious
medium confidence
Purpose & Capability
The declared purpose (generate test plans, run API/UI/LLM checks against a Vercel/Supabase/Firebase stack) is coherent with the env vars and actions described in SKILL.md (VERCEL_TOKEN, SUPABASE_* and an LLM key). However registry metadata at the top of the package lists no required env/binaries while claw.json declares node/npx/git and OPENROUTER_API_KEY, SUPABASE_URL, SUPABASE_ANON_KEY, VERCEL_TOKEN — this mismatch is an incoherence that should be resolved before trust.
!
Instruction Scope
SKILL.md explicitly instructs scanning project files (package.json, src/app/**, supabase/migrations, etc.), generating test scripts under qa-tests/, and executing them. Generated tests use process.env (e.g., TEST_AUTH_TOKEN, VALIDATION_BASE_URL) and will perform network calls against the target app and external LLM judge. Although SKILL.md claims it 'never reads .env/.env.local or credential files directly', generated code references process.env and the skill will read repository files — this could unintentionally surface secrets or execute repository code. The instructions also run tests (execute pipeline) which may run arbitrary project scripts; that has operational risk and requires review.
Install Mechanism
This is an instruction-only skill with no install spec and no code files to execute on install, which is low-risk from an install vector perspective.
!
Credentials
The env vars referenced (OPENROUTER_API_KEY, SUPABASE_URL, SUPABASE_ANON_KEY, VERCEL_TOKEN) are plausible for the stated purpose. But: (1) the top-level registry metadata reports no required env vars while claw.json lists several — an inconsistency; (2) SKILL.md-generated tests also expect TEST_AUTH_TOKEN and VALIDATION_BASE_URL (and other process.env reads) that are not declared in the registry metadata, so users may be asked to provide additional secrets unexpectedly; and (3) SUPABASE_ANON_KEY and VERCEL_TOKEN are sensitive and should be scoped to test accounts. These factors make the environment/credential requirements disproportionate without further clarification.
Persistence & Privilege
always:false and no install-time persistence are appropriate. The skill will create files (test plan, tests, reports) in the workspace and execute them — that's expected for a QA tool and does not require special persistent privileges beyond filesystem/network for the workspace. Still, executing repository tests is effectively granting it permission to run arbitrary project code, so exercise operational caution.
What to consider before installing
This skill appears to do what it says (generate plans and run tests for a Vercel/Supabase/Firebase app), but there are mismatches you should resolve and safety steps you should take before using it: - Verify which environment variables are actually required. claw.json lists OPENROUTER_API_KEY, SUPABASE_URL, SUPABASE_ANON_KEY, VERCEL_TOKEN, but the registry metadata shows none — ask the author to reconcile and document all env vars. Expect additional vars like TEST_AUTH_TOKEN and VALIDATION_BASE_URL used by generated tests. - Do not provide production tokens. Create scoped, short-lived, or read-only test credentials for Supabase and Vercel and a dedicated OpenRouter/LLM key with limited quota for judge runs. - Inspect generated test files and the test-plan JSON before executing them. The skill will generate and then run tests that execute code from your repository; review for any unexpected shell commands or network calls. - Run first in an isolated environment (CI job, container, or throwaway branch) so tests cannot affect production resources or leak secrets from the machine. - If you need stricter controls, request the author to declare all env vars in SKILL.md/claw.json and add an option to only generate tests (no execution) so you can run them manually after review. Given the inconsistencies and the potential to run arbitrary project code, treat this skill as moderately risky until the above clarifications and mitigations are in place.

Like a lobster shell, security has layers — review code before you run it.

latestvk97e93zg04t38wawwsa38az3yx83eyzn

License

MIT-0
Free to use, modify, and redistribute. No attribution required.

Comments