lead-contact-enrichment-agent

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill appears to perform lead enrichment as advertised, but it has review-worthy privacy, credential-handling, and provenance issues.

Install only if you trust the publisher and are comfortable sending lead/contact data to Explorium. Avoid entering secrets where they can be displayed or logged, consider omitting request-reasoning metadata, and delete temporary result files containing enriched emails or phone numbers after use.

Findings (6)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A user may believe the plugin is official and trusted by Explorium when the artifact itself says it is not.

Why it was flagged

The skill simultaneously presents Explorium as the author while saying it is unofficial and not endorsed by Explorium. For a credential-using integration, this creates provenance ambiguity.

Skill content
author: "Explorium" ... "Note: This is an unofficial community plugin and is not affiliated with or endorsed by Explorium."
Recommendation

Verify the publisher before entering an API key. The maintainer should use accurate author information, provide a homepage/source link, and remove conflicting branding.

What this means

Lead details, internal notes, or other sensitive information included in the user's prompt could be sent to the provider as metadata beyond the core search fields.

Why it was flagged

The workflow passes the full user request to the CLI as request metadata. The CLI code states that call-reasoning sends user query text to api.explorium.ai and should be opt-in, but the workflow does not include an explicit consent step.

Skill content
QUERY="<user's original request>" ... --call-reasoning "$QUERY"
Recommendation

Do not send --call-reasoning by default. Ask the user before including prompt text in API metadata, or omit it unless strictly needed.

What this means

Enriched contact data may remain on disk and could be exposed on shared systems or accidentally reused in later agent sessions.

Why it was flagged

The CLI writes all API results, which may include enriched emails, phone numbers, and lead lists, to shared temporary files without visible per-file permission hardening or cleanup.

Skill content
All results are written to temporary files in /tmp/. ... TEMP_DIR = pathlib.Path("/tmp") ... path.write_text(json.dumps(data, indent=2, default=str))
Recommendation

Use a per-user secure temp directory, set restrictive permissions on result files, provide cleanup, and let users choose an output path for sensitive exports.

What this means

Someone with access to the terminal session, logs, or screen could see the API key.

Why it was flagged

The API key is expected for the service, but setup reads it with a visible prompt and later echoes a command containing the full key, which can expose the credential in terminal scrollback or logs.

Skill content
read -r -p "Enter your Explorium API key (or press Enter to skip): " api_key ... echo "  export EXPLORIUM_API_KEY='$api_key'"
Recommendation

Use a silent prompt such as read -s, avoid echoing the actual key back to the terminal, and prefer environment variables or secure credential storage.

What this means

The agent may traverse unrelated filesystem paths, which can be slow or unexpectedly inspect path names outside the project.

Why it was flagged

The skill tells the agent to search from the filesystem root to discover the CLI. This is intended to find the installed tool, but it is broader than a fixed install path.

Skill content
pathlib.Path('/').glob('sessions/*/mnt/**/*agentsource*/bin/agentsource.py') ... pathlib.Path('/').glob('**/.local-plugins/**/*agentsource*/bin/agentsource.py')
Recommendation

Prefer the documented install path under ~/.agentsource or a user-provided CLI path instead of broad recursive filesystem searches.

What this means

Users have less provenance information to verify the bundled executable code before running it.

Why it was flagged

The registry metadata does not provide a source/homepage or install spec, while the artifact includes executable setup and CLI code.

Skill content
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill ... Code file presence: setup.sh, bin/agentsource.py
Recommendation

Review the included setup.sh and bin/agentsource.py before running them, and prefer packages with a verifiable source repository or publisher.