PocketBase
Analysis
This is an instruction-only PocketBase reference; it mentions admin credentials and server-side hooks, but those are expected for building PocketBase backends.
Findings (2)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
JavaScript hooks go in `pb_hooks/*.pb.js` — the `.pb.js` extension is required - Hooks run synchronously and block the request
The skill documents PocketBase server-side JavaScript hooks. This is a normal PocketBase development feature, but hook files execute as part of the backend runtime.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Admin endpoints need superuser auth, not regular user tokens - Create admin token: `pb.admins.authWithPassword(email, password)`
The skill instructs use of PocketBase superuser/admin authentication. That is expected for admin API work, but it is high-privilege credential handling that users should treat carefully.
