Keys

SuspiciousAudited by ClawScan on May 10, 2026.

Overview

This is a coherent key-broker, but it gives the agent broad authenticated access to user accounts without clear per-action approval or narrow scoping.

Install only if you want the agent to make authenticated API calls on your behalf. Use restricted, non-production API keys where possible, avoid high-risk Stripe or GitHub tokens, review every mutating request, and do not run or share verification commands that print the actual key.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent or a prompt causes an unsafe request, it could act with the user's OpenAI, Anthropic, Stripe, or GitHub token privileges.

Why it was flagged

The broker reads API keys from the local OS keychain and attaches them to outbound authenticated API requests, giving the agent delegated account authority.

Skill content
security find-generic-password -s "keys:${service}" -a "$USER" -w ... secret-tool lookup service "keys:${service}" ... printf 'Authorization: Bearer %s' "$key"
Recommendation

Use least-privileged API keys, avoid storing high-risk production or financial tokens, and add explicit user confirmation for sensitive or mutating calls.

What this means

A mistaken or malicious instruction could create, modify, delete, or expose data in connected third-party accounts.

Why it was flagged

The tool allows broad access to entire provider API domains and permits mutating methods such as POST, PUT, PATCH, and DELETE without endpoint-level restrictions or approval checks.

Skill content
["stripe"]="^https://api\.stripe\.com/" ... ["github"]="^https://api\.github\.com/" ... [[ "$method" =~ ^(GET|POST|PUT|PATCH|DELETE|HEAD)$ ]]
Recommendation

Restrict allowed endpoints and methods per service, deny destructive methods by default, and require user approval before account-changing requests.

What this means

A user could accidentally reveal an API key in terminal output or a shared transcript while trying to verify that it exists.

Why it was flagged

The management guide includes verification commands that print the stored key, which weakens the skill's repeated claim that keys should never be exposed to the agent context.

Skill content
## Verify a Key Exists

```bash
# This should return the key ... security find-generic-password ... -w ... secret-tool lookup service keys:SERVICE
```
Recommendation

Replace key-printing verification steps with commands that only report presence or success, and explicitly tell users not to share command output containing secrets.

What this means

The installed command will be available in future shells and can use stored keys when invoked.

Why it was flagged

The setup is a manual local install of a shell script into the user's PATH and modifies shell startup configuration; this is purpose-aligned but important because the script handles API keys.

Skill content
cp keys-broker.sh ~/.local/bin/keys-broker
chmod +x ~/.local/bin/keys-broker
echo 'export PATH="$HOME/.local/bin:$PATH"' >> ~/.bashrc
Recommendation

Review the script before installing, install it only from a trusted copy, and remove the PATH entry if you stop using the skill.