Taste
Analysis
Taste has a coherent recommendation goal, but it asks to read private email/calendar data, store a detailed consumption history, and run daily self-updates from GitHub, so it needs careful review before installation.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`taste.init` runs automatically on first invocation ... registers the `taste:update` cron job (midnight daily) for automatic self-updates.
The skill instructs automatic first-run persistence and a recurring cron job that continues operating after the immediate user task. This is not necessary for one-off recommendations and is not clearly opt-in.
| `taste:update` | cron | `0 0 * * *` (midnight daily) | Self-update from GitHub source |
Daily self-updates from a remote GitHub source are described without artifact evidence of pinning, signature verification, changelog approval, or user review before new instructions are adopted.
Taste ingests signals and produces recommendations -- no external side effects.
This statement conflicts with other artifacts that describe email/calendar scanning, persistent JSONL writes, external Maps/web enrichment, and cron-based self-updates. It could cause users to underestimate the skill's operational impact.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Access the user's email account ... read full body when needed ... Access the user's Google Calendar for restaurant reservations and hotel bookings
The skill requires access to private email bodies and calendar data to build its model. This is purpose-aligned, but it is high-impact account authority and the artifacts do not show a least-privilege credential or permission contract.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
Stored in `extractions.jsonl` ... `source_message_id` ... `confirmation_number` ... `items` ... `total_amount` ... `location` ... `party_size`
The skill persists detailed extracted email/calendar-derived purchase, travel, and reservation metadata. The artifacts describe storage but do not define retention limits, deletion controls, encryption, or rules for excluding sensitive records.
Automatically after `taste.scan` for newly created items ... Google Maps — primary source ... Web search — backup.
External provider lookups are disclosed and purpose-aligned for enrichment, but they may reveal venue, product, city, or other consumption-derived data to Google Maps or web search providers.
