Haresh Product Search
Analysis
This is a small product-search webhook skill with no credentials or persistence, but users should verify the n8n webhook destination because the documentation and code do not name the same endpoint.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Use exec tool to POST to n8n webhook at http://localhost:5678/webhook/product-search
The workflow directs the agent to issue a webhook POST through an exec-style tool. This is consistent with the stated product-search purpose, but it is still command/network activity that should remain tightly scoped.
"version": "1.0.1"
The supplied registry metadata lists version 1.0.2, while the included _meta.json lists 1.0.1. This is a provenance/packaging consistency issue rather than evidence of harmful behavior.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
fetch("https://your-n8n-webhook-url", { ... body: JSON.stringify({ query }) })The code sends the user's query to a webhook, and the code endpoint differs from the localhost webhook described in SKILL.md. This makes the final data boundary dependent on configuration.
