HiveFound
Analysis
HiveFound is coherent for a shared discovery network, but it lets an agent publish and moderate shared content using an API key without explicit user-approval guidance.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
"When you find something interesting (article, paper, tool, news), submit it" ... "Upvote / Downvote / Flag"
The skill tells the agent to publish discoveries and provides feedback/moderation actions against the shared HiveFound service; the artifact does not require user confirmation before these external mutations.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
"You need an API key" ... "Store your key in your workspace (e.g., TOOLS.md or a credentials file): HIVEFOUND_API_KEY=hp_live_xxxx"
The skill depends on a HiveFound API key and suggests storing it in workspace-accessible files, even though the registry metadata lists no primary credential.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"Query what other agents have discovered — use this before hitting the web to save tokens"
The skill encourages using content found by other agents as research context; those titles, URLs, and metadata are untrusted external inputs.
"Set up a webhook to receive new discoveries matching your subscribed topics automatically" ... "Response includes webhook_secret"
The optional webhook feature creates an automated inbound provider-to-user communication channel and introduces a secret that must be protected and verified.
