Slack Channel Context
Analysis
This skill largely matches its stated purpose, but it should be reviewed because its file-loading tool can potentially read Markdown files outside the intended Slack context folder.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
context_file = self.contexts_dir / f"{channel_id}.md"
if context_file.exists():
content = self._read_file(context_file)The tool builds a filesystem path directly from the channel_id argument and reads it if it exists. The artifact does not show validation, normalization, or a resolved-path check to ensure the file remains under the intended slack-channel-contexts directory.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
4. **Context Injection**: Loads the found file into session context 5. **Caching**: Caches the loaded context for 1 hour
The skill intentionally loads persistent Markdown files into the agent's session context and caches them, so those files can influence later agent behavior.
