Back to skill
Skillv1.0.1
ClawScan security
Greptile · ClawHub's context-aware review of the artifact, metadata, and declared behavior.
Scanner verdict
SuspiciousFeb 15, 2026, 9:24 AM
- Verdict
- suspicious
- Confidence
- medium
- Model
- gpt-5-mini
- Summary
- The skill is a thin wrapper around the Greptile REST API and mostly matches its description, but it transmits your GitHub token to an external service, has a small runtime mismatch (uses python3 but doesn't declare it), and comes from an unknown source—so review and limit credentials before using.
- Guidance
- This skill appears to implement the Greptile API as advertised, but it requires you to provide or allow access to a Git host token which the wrapper will forward to api.greptile.com. Only proceed if you trust that third-party service. If you decide to use it: (1) create a GitHub PAT with the minimum scopes needed (avoid using a personal/all-access token), (2) avoid using a token that grants org- or account-level admin access, (3) consider authenticating via a temporary token or using a test repository first, (4) be aware the script will read 'gh auth token' if you don't supply a token environment variable (so local gh CLI credentials can be used), and (5) note the script calls python3 but python3 is not declared as a required binary — ensure python3 is available in your environment. If you cannot verify greptile.com's provenance or privacy policy, treat this as high-risk and avoid providing high-privilege credentials.
Review Dimensions
- Purpose & Capability
- noteThe name/description match the included script and instructions: the skill queries and manages Greptile-indexed repos and requires a GREPTILE_TOKEN plus a GitHub/GitLab token. Asking for a Git host token is plausible because the script forwards it to the Greptile API so Greptile can access private repos. However the package has no homepage/source and the publisher identity is unknown, which reduces provenance confidence.
- Instruction Scope
- okSKILL.md confines runtime actions to calling scripts/greptile.sh which performs API calls (index/status/query/search) against https://api.greptile.com/v2. The instructions do not attempt to read unrelated files or exfiltrate arbitrary local data. They do, however, instruct the wrapper to obtain a GitHub token via 'gh auth token' if an env var is not provided (this reads local gh CLI auth state).
- Install Mechanism
- okNo install spec — instruction-only plus a small script shipped with the skill. Nothing is downloaded or written to disk during installation by the registry, so install risk is low.
- Credentials
- concernThe script requires GREPTILE_TOKEN and a Git host token (GITHUB_TOKEN or GREPTILE_GITHUB_TOKEN) and forwards the Git token to api.greptile.com via the 'X-GitHub-Token' header. Sending your GitHub PAT to a third-party API is a high-privilege action; it may be justified for indexing private repos, but you should only provide a minimal-scope token and only if you trust greptile.com. The script also attempts to call 'gh auth token' (reads local gh CLI credentials) — GH CLI access is declared as a required binary, but the script uses python3 for URL quoting while python3 is not listed in the declared required binaries (runtime mismatch).
- Persistence & Privilege
- okThe skill is not always-enabled and does not request persistent system-wide modifications. It does not modify other skills or system settings.
