PocketBase

ReviewAudited by ClawScan on May 1, 2026.

Overview

This is an instruction-only PocketBase reference; it mentions admin credentials and server-side hooks, but those are expected for building PocketBase backends.

This skill appears safe as a PocketBase reference, but be careful when using it for admin operations or server hooks: admin credentials can control backend data, and hook files run as backend code.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If the agent uses admin credentials, it could access or change privileged PocketBase backend data depending on the user's instructions and server permissions.

Why it was flagged

The skill instructs use of PocketBase superuser/admin authentication. That is expected for admin API work, but it is high-privilege credential handling that users should treat carefully.

Skill content
Admin endpoints need superuser auth, not regular user tokens
- Create admin token: `pb.admins.authWithPassword(email, password)`
Recommendation

Only provide PocketBase admin credentials when needed, prefer least-privilege accounts where possible, and review any admin API changes before applying them.

What this means

Generated or edited hook code could affect server behavior and request handling.

Why it was flagged

The skill documents PocketBase server-side JavaScript hooks. This is a normal PocketBase development feature, but hook files execute as part of the backend runtime.

Skill content
JavaScript hooks go in `pb_hooks/*.pb.js` — the `.pb.js` extension is required
- Hooks run synchronously and block the request
Recommendation

Review hook code before deploying it and keep hooks limited to the intended backend behavior.