XGJK BP Audit

ReviewAudited by ClawScan on May 10, 2026.

Overview

This looks like a legitimate BP audit integration, but it can use an appKey to create BP records in production and that write authority is under-declared and somewhat inconsistently described.

Install only if you trust the BP API integration and can provide a least-privilege appKey. Treat normal audits as read-only. Before any `add_key_result` or `add_action`, require the agent to show the exact target ID and payload and ask for final confirmation.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A mistaken or over-broad instruction could add key results or actions to the BP system under the user's appKey.

Why it was flagged

The skill exposes POST-style create operations and a raw JSON body option for BP records. Even though writes are documented, this can mutate business planning data and lacks a mandatory final approval/rollback step in the artifacts.

Skill content
### 写入 ... `add_key_result` ... `add_action` ... `--body_json` 传 JSON 对象字符串;如果与显式参数同时提供,显式参数覆盖同名字段
Recommendation

Use write actions only after an explicit user request, show the exact parent ID and request payload, require final confirmation, and avoid `--body_json` unless strictly necessary.

What this means

Users may not realize the skill needs a production API key with read/write authority, or may provide the key in an unsafe way.

Why it was flagged

The script requires and sends an appKey for all API calls, but the registry says there are no required env vars or primary credential, and the auth docs name a different variable. This leaves the credential boundary unclear.

Skill content
BP_OPEN_API_APP_KEY       Authentication key (required) ... APP_KEY = os.environ.get("BP_OPEN_API_APP_KEY", "") ... headers = {"appKey": APP_KEY}
Recommendation

Declare the credential and required environment variable in metadata, use one consistent env var name, and require a least-privilege appKey, ideally read-only unless write mode is intentionally enabled.

What this means

A user may expect a purely read-only audit while the skill also includes write paths.

Why it was flagged

This read-only assurance conflicts with other artifacts that document add/write capabilities, which could cause users or agents to underestimate possible side effects.

Skill content
- 对可能导致数据泄露、破坏、越权或高风险副作用的请求,必须礼貌拒绝
- 审计过程中仅执行读操作,不修改任何 BP 数据
Recommendation

Clearly separate read-only audit mode from write mode in the main description and require explicit confirmation before any production change.

What this means

BP content and personnel details may be visible in the chat or agent context during the audit.

Why it was flagged

The API responses can include internal BP structures, employee names, IDs, ownership, and alignment relationships. This is expected for an audit tool, but it places sensitive business context into the agent session.

Skill content
`taskUsers` | List | 任务参与人列表 ... `empList` | List | 该角色下的员工列表(含 `id`、`name`)
Recommendation

Scope queries narrowly, avoid full-tree retrieval unless needed, and do not share generated reports outside the intended business audience.