b2b-sales-prospecting-agent

PassAudited by VirusTotal on May 11, 2026.

Overview

Type: OpenClaw Skill Name: explorium-sales-prospecting Version: 1.0.0 The skill bundle provides a B2B sales prospecting tool that interacts with the Explorium API. All network communication is directed to the declared `https://api.explorium.ai/v1/` endpoint. API keys are handled securely via environment variables or a `chmod 600` configuration file. The core CLI tool (`bin/agentsource.py`) uses `pathlib` for file operations and `urllib.request` for network calls, avoiding direct shell execution of user-controlled input. Temporary files are created in `/tmp` with unique, non-user-controlled names, mitigating path traversal risks. The `SKILL.md` instructions guide the agent responsibly, emphasizing user confirmation and secure API key handling, and do not contain prompt injection attempts designed to subvert the agent's core directives or exfiltrate data. The ability to write to user-specified output paths (e.g., `~/Downloads/`) is a standard feature for a data export tool and not indicative of malicious intent.

Findings (0)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A malicious or unexpected local agentsource.py file could be executed with the user's environment and API key access.

Why it was flagged

The skill tells the agent to search broad filesystem locations for a matching Python CLI and then execute it. If the expected installed copy is absent or shadowed, this can run an unverified local script.

Skill content
candidates = [ pathlib.Path.home() / '.agentsource/bin/agentsource.py', *sorted(pathlib.Path('/').glob('sessions/*/mnt/**/*agentsource*/bin/agentsource.py')), *sorted(pathlib.Path('/').glob('**/.local-plugins/**/*agentsource*/bin/agentsource.py')) ] ... RESULT=$(python3 "$CLI" statistics ...)
Recommendation

Use only the reviewed CLI path installed by this skill, preferably ~/.agentsource/bin/agentsource.py, and avoid broad path discovery unless the file source is verified.

What this means

Sensitive business targeting details, customer exclusions, or campaign strategy included in the user's request may be sent to Explorium as metadata.

Why it was flagged

The workflow includes the user's original request in the API call metadata. The artifacts disclose remote request metadata, but the default command pattern does not ask for separate consent before sending potentially sensitive sales targeting text.

Skill content
At the start of every workflow ... QUERY="<user's original request>" ... --call-reasoning "$QUERY"
Recommendation

Avoid including confidential strategy or customer names in prospecting prompts, or remove --call-reasoning unless the user explicitly agrees to send the query text.

ConcernMedium Confidence
ASI06: Memory and Context Poisoning
What this means

Prospect lists and contact details may remain on the local machine after the task and could be exposed to other local processes or later agent tasks.

Why it was flagged

The skill stores API result data, which can include contact details, in /tmp and describes cleanup as OS-managed. The artifacts do not show automatic deletion or dedicated restrictive permissions for these result files.

Skill content
Verified Contact Info — Professional emails, direct phones, LinkedIn profiles ... `/tmp/agentsource_*.json` | API result data | OS cleanup
Recommendation

Delete /tmp/agentsource_*.json files after use, avoid running on shared machines, and consider changing the CLI to create private temp files with restrictive permissions and explicit cleanup.

What this means

The skill can make authenticated Explorium API calls and may consume account credits when the user confirms prospecting actions.

Why it was flagged

The skill uses and can persist an Explorium API key. This is expected for the integration and the setup script uses restrictive permissions, but registry metadata lists no required env vars or primary credential.

Skill content
Optionally save your API key to $CONFIG_FILE (mode 600) ... CONFIG_FILE="$INSTALL_DIR/config.json"
Recommendation

Use a scoped API key if available, monitor API usage/credits, and do not paste keys into chat.

What this means

Users may assume the plugin is officially maintained by Explorium even though the description says it is unofficial.

Why it was flagged

The author field and disclaimer are in tension. The disclaimer reduces the risk, but the author value could still make users over-trust the plugin's provenance.

Skill content
author: "Explorium" ... "This is an unofficial community plugin and is not affiliated with or endorsed by Explorium."
Recommendation

Treat it as a community plugin, verify the source before installing, and confirm the API endpoint and CLI code match what you expect.