Workflow

ReviewAudited by ClawScan on May 10, 2026.

Overview

This is a coherent instruction-only workflow builder, but it can guide the agent to create persistent scripts that use API credentials and store workflow data.

Use this skill if you want local workflow automation. Before enabling a generated workflow, review its script, config, schedule, webhook route, and stored credentials; start with dry-run mode; use least-privilege API tokens; and periodically clean or inspect state, data, and logs.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A generated workflow can perform real actions on the machine or through APIs when run.

Why it was flagged

The skill tells the agent/user how to create executable workflow scripts. That is central to the workflow-building purpose, but generated scripts can run shell commands and make network calls.

Skill content
touch .../{flow.md,config.yaml,run.sh,CHANGELOG.md}; chmod +x .../run.sh
Recommendation

Review each generated `run.sh`, run `--dry-run` first, and only execute scripts that match the intended workflow.

What this means

Workflows may act with the privileges of stored API keys or OAuth tokens.

Why it was flagged

The workflow pattern includes reading service credentials from the local Keychain. This is expected for API integrations, but it grants workflows access to whatever tokens the user stores for them.

Skill content
Secrets in macOS Keychain (`security find-generic-password`)
Recommendation

Use dedicated least-privilege tokens, verify secret names before use, and avoid storing broad account credentials for generic workflows.

What this means

Local workflow files may retain sensitive payloads or stale state that affects later runs.

Why it was flagged

The skill deliberately stores state, logs, and intermediate data between runs. This is purpose-aligned, but those files can contain workflow inputs, outputs, or private operational data.

Skill content
State: `flows/{name}/state/` ... Logs: `flows/{name}/logs/` ... Data: `flows/{name}/data/`
Recommendation

Do not write secrets to logs or data files, set retention/cleanup rules, and inspect state files before reusing or sharing a workspace.

What this means

If webhook validation is incomplete, an external caller could trigger workflows or inject unexpected payloads.

Why it was flagged

The webhook pattern accepts external payloads and starts local workflows. The docs mention signature and timestamp validation, but the sample router leaves that as implementation work.

Skill content
Configure in external service to POST to: `https://your-server/webhooks/{workflow}` ... Trigger workflow ... `(cd ... && ./run.sh) &`
Recommendation

Implement signature verification, timestamp checks, event allowlists, and workflow-path allowlists before exposing any webhook route.

What this means

A workflow may keep running on a schedule or in response to events without further manual invocation.

Why it was flagged

The lifecycle guide includes cron scheduling, and other files describe webhooks and file watchers. Persistent automation is disclosed and purpose-aligned, but it can continue operating after setup.

Skill content
0 8 * * * cd /path/to/workflows/flows/my-workflow && ./run.sh >> /dev/null 2>&1
Recommendation

Enable schedules or watchers only when requested, document them, monitor logs, and remove cron/webhook/file-watcher entries when no longer needed.