BP Monthly Report Writer

PassAudited by ClawScan on May 10, 2026.

Overview

The skill is coherent for drafting BP monthly reports, but it necessarily reads internal BP/work-report data and stores local intermediate report artifacts.

Before using this skill, make sure you are allowed to access the target BP node and month, store generated artifacts somewhere protected, and inspect any helper scripts before running them. The provided artifacts do not show exfiltration, destructive behavior, or hidden persistence beyond the disclosed report files.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may read BP goals, key results, standards, and linked work reports for the selected business node.

Why it was flagged

The skill expects delegated access to BP and linked report data. This is sensitive business access, but the visible instructions scope it to a confirmed period and node.

Skill content
fetch the node's BP goals, key results, measure standards, and linked reports ... Ask for and confirm the `BP周期` and the `目标节点` before fetching BP data.
Recommendation

Use it only with an account authorized for the target BP period and node, and confirm the exact scope before allowing data fetches.

What this means

Generated folders may contain business evidence, source references, AI judgments, and user review content that should not be exposed casually.

Why it was flagged

The workflow persists evidence, judgments, cards, and reviewed reports locally. This supports auditability and rolling reports, but it can retain sensitive business context for later reuse.

Skill content
Every report run must leave a folder with both the final report and the intermediate artifacts ... `03_evidence_ledger.md` ... `04_cards/` ... `07_user_review_report.md`
Recommendation

Store outputs in an approved location, review what evidence is retained, and delete or restrict access to artifacts when they are no longer needed.

What this means

If the helper scripts are run, the user is relying on package contents whose upstream provenance is not clear from the registry metadata.

Why it was flagged

The registry context does not provide a source homepage and lists helper scripts despite no install spec. The provided artifacts do not show automatic execution or suspicious static findings, so this is a provenance/review-context note rather than a concern.

Skill content
Source: unknown; Homepage: none ... No install spec — this is an instruction-only skill ... 6 code file(s): scripts/...
Recommendation

Review the included scripts and run them only in an appropriate workspace; no evidence here indicates they are auto-executed.