Data Ai Daily Brief Skill

ReviewAudited by ClawScan on May 1, 2026.

Overview

This appears to be a purpose-aligned daily briefing skill, but its optional delivery features can send reports to third-party services or publish them publicly using user-provided credentials.

Before installing, verify the source, keep all delivery credentials scoped and private, leave unused channels disabled, and review each brief before publishing it to team channels or GitHub Pages.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

It may be harder to verify who maintains the skill or where updates come from.

Why it was flagged

The package provenance is not clearly declared, which matters because the skill includes helper scripts that can use service credentials. No remote installer or hidden dependency is shown.

Skill content
Source: unknown; Homepage: none
Recommendation

Inspect the included scripts and prefer installing from a trusted source before configuring credentials.

What this means

If enabled, a generated brief could become publicly accessible and the script can modify a GitHub repository.

Why it was flagged

The optional GitHub Pages delivery path can create a public repository and upload the generated report. This is disclosed and purpose-aligned, but it is a high-impact account/public-publishing action.

Skill content
"public": True ... api_request("POST", f"{API_BASE}/user/repos" ... api_request("PUT", file_url, upload_data, token=token)
Recommendation

Use a dedicated repository and least-privilege token, and review the report before enabling GitHub Pages publishing.

What this means

Leaked or over-scoped credentials could let others post to your channels, send email, or modify the configured GitHub target.

Why it was flagged

The skill documents optional credentials for delivery channels. These credentials are expected for the stated purpose, but they can authorize posting, emailing, bot messaging, or GitHub publishing.

Skill content
`SMTP_PASSWORD` | SMTP password ... `GITHUB_TOKEN` | GitHub Personal Access Token ... `SLACK_WEBHOOK_URL` ... `TELEGRAM_BOT_TOKEN`
Recommendation

Keep credentials in environment variables or a protected config, disable unused channels, and use narrow/dedicated tokens where possible.

What this means

Any information included in the brief may be shared with the configured chat service or recipients.

Why it was flagged

The delivery script sends generated report content to a configured webhook. This matches the delivery feature, but it means report content leaves the local environment.

Skill content
payload = {"msgtype": "markdown", "markdown": {"title": title, "text": content}} ... urllib.request.urlopen(req)
Recommendation

Only configure trusted channels and avoid including confidential internal information unless the destination is approved.

What this means

If a platform honors this schedule, reports could be generated and delivered automatically on weekdays.

Why it was flagged

The generated default config includes a weekday schedule for recurring reports. The artifacts do not show silent cron installation, so this is an expected automation option rather than rogue persistence.

Skill content
"cron": [{ "name": "Data+AI 全球日报", "schedule": "0 8 * * 1-5", "timezone": "Asia/Shanghai"
Recommendation

Enable scheduled delivery only when intended and verify the target channels before turning on automation.