Personaldatahub
Analysis
This skill is designed for a real personal-data gateway, but it needs review because it can auto-use/create and log API keys, run broad install/start commands, and instruct direct GitHub credential use outside the stated gateway.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
install: cd ../../ && pnpm install && pnpm build && npx pdh init "OpenClaw Agent" && npx pdh start
The documented install path changes to a parent directory, runs package installation/build steps, invokes an unpinned npx package, and starts a service, despite the registry showing no install spec.
GitHub access is managed via your own credentials ... You do NOT use the `personal_data_pull` tool for GitHub; instead, use your own GitHub tools directly
The skill description and SKILL.md frame Gmail/GitHub access as mediated by PersonalDataHub policy, but the runtime prompt tells the agent to use direct GitHub tools with its own credentials.
name: 'personal_data_pull' ... name: 'personal_data_propose' ... 'The action is staged for owner review — it will NOT execute until the owner approves it in the PersonalDataHub GUI.'
The skill exposes tools that can retrieve personal data and stage outbound email actions. This is central to the stated purpose and the artifacts say actions require owner approval, but it is still high-impact authority.
Starts the server in the background ... npx pdh start
The skill discloses a long-running background PersonalDataHub server. This is purpose-aligned, but it persists beyond a single agent request and handles sensitive connected accounts.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const envApiKey = process.env.PDH_API_KEY; ... const creds = readCredentials(); ... const keyResult = await createApiKey(hubUrl, 'OpenClaw Agent'); ... api.logger.info(`PersonalDataHub: Auto-created API key. Save this for your config: ${apiKey}`);The runtime can obtain an API key from env vars, read local credentials, or create a new key automatically, then logs the generated secret. That API key gates access to personal data and action proposals, while registry metadata says there is no primary credential or env-var requirement.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"command": "npx", "args": ["pdh", "mcp"] ... only sources with connected OAuth tokens get tools
The recommended setup routes tool discovery and personal data access through an MCP server connected to OAuth-backed sources. That is expected for this integration, but it makes the MCP server and OAuth policy boundary important.
