SAP Integration Suite

WarnAudited by ClawScan on May 10, 2026.

Overview

Review before use: this skill can use SAP credentials to read tables and call arbitrary SAP functions, but the artifacts do not clearly limit or require approval for those actions.

Only connect this skill to non-production or tightly scoped SAP accounts unless you have reviewed and restricted it. Add allowlists for tables and RFC/BAPI functions, require explicit approval for mutating actions and large exports, store credentials securely, and verify dependencies/provenance before running the scripts.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If connected with a real SAP account, the agent could invoke read or write RFC/BAPI functions in the SAP system, depending on that account's permissions.

Why it was flagged

The script accepts an arbitrary RFC function name and parameters and calls it directly over an authenticated SAP connection; no allowlist or confirmation control is shown.

Skill content
SAP RFC Function Caller - Execute any RFC-enabled function module ... result = self.conn.call(function_name, **parameters)
Recommendation

Use an allowlist of approved functions, require explicit user approval for any mutating RFC/BAPI, test in non-production first, and log every call with parameters and result status.

What this means

A broad SAP credential could expose customer, financial, employee, or operational records to local exports.

Why it was flagged

The extractor is designed to read any SAP table, with all fields if none are specified, and can export the results. The artifact does not bound tables, fields, row limits beyond a default, or data sensitivity.

Skill content
Extract data from any SAP table using RFC_READ_TABLE ... fields: List of fields to extract (None = all fields) ... 'QUERY_TABLE': table_name
Recommendation

Restrict table and field access, require approval for large or sensitive exports, mask regulated data where possible, and use least-privilege read-only SAP roles.

What this means

Using a privileged SAP user would give the agent the same broad access, including potentially sensitive reads or business-data mutations.

Why it was flagged

The script requires SAP account credentials from a local JSON config and then performs operations with that account's privileges, while the registry metadata does not declare a credential or config contract.

Skill content
required_params = ['ashost', 'sysnr', 'client', 'user', 'passwd'] ... self.conn = pyrfc.Connection(**connection_params)
Recommendation

Do not use personal or administrator SAP accounts. Provide a scoped service account, store secrets in a secure secret manager rather than plaintext config files, and document the required permissions.

What this means

Users may need to install SAP/Python dependencies themselves and should verify exactly what code and packages will run.

Why it was flagged

The package includes runnable SAP integration code but provides limited provenance and no dependency/install contract. This does not prove malicious behavior, but it makes safe setup harder to verify.

Skill content
Source: unknown; Homepage: none ... Install specifications: No install spec — this is an instruction-only skill ... Code file presence: 2 code file(s)
Recommendation

Provide a clear source repository, dependency list or lockfile, and installation instructions; users should review dependencies before executing the scripts.

What this means

A user may connect production or privileged SAP credentials believing the skill has built-in guardrails that are not evident in the artifacts.

Why it was flagged

The documentation claims safeguards are enforced, but the included scripts expose generic SAP function and table access and do not show enforcement of minimal authorization, encryption, or audit logging.

Skill content
Security best practices enforced: - Minimal authorization principle - Encrypted data transmission - Audit trail logging - No hardcoded credentials
Recommendation

Replace broad safety claims with precise requirements and implemented controls, or add code-level enforcement for authorization scope, secure transport, and audit logging.