Strong Skill
Security checks across static analysis, malware telemetry, and agentic risk
Overview
The skill is coherent for Strong workout API access, but it requires Strong account credentials and includes commands that can expose tokens or create share links.
Install only if you are comfortable giving the skill access to your Strong account. Treat any login or refresh-token output as secret, and only use sharing commands when you intentionally want to create a shareable link for a workout log or template.
Static analysis
No static analysis findings were reported for this release.
VirusTotal
VirusTotal findings are pending for this skill version.
Risk analysis
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If installed and used, the agent can authenticate to the user's Strong account and retrieve account, workout, exercise, and template data; token outputs should be treated like credentials.
The skill requires Strong account credentials and documents commands that return session tokens. This is expected for the stated API integration, but it is sensitive authority.
`STRONG_USERNAME` | Strong account username or email ... `STRONG_PASSWORD` | Strong account password ... **Output:** `{ "accessToken": "eyJ...", "refreshToken": "kf3Z...", "userId": "uuid" }`Only set these environment variables in a trusted environment, avoid asking the agent to display login tokens unless needed, and rotate the Strong password if credentials or tokens are exposed.
A share command may make a workout log or template accessible through a generated link.
The skill includes a POST operation that creates a share link for a workout log. This is documented and purpose-aligned, but it can expose private workout information if run unintentionally.
`def cmd_share_log(args): ... _request("POST", f"/api/users/{user_id}/logs/{args.log_id}/link", headers=_auth_headers(token))`Use `share_log` and `share_template` only after an explicit user request and review what item ID is being shared.
It may be harder for a user to verify the publisher or compare the installed skill against an upstream repository before providing Strong credentials.
The registry metadata does not provide a verified source repository for the skill package. The included code is visible and there is no install script, so this is a provenance note rather than a concrete unsafe behavior.
Source: unknown
Review the included `scripts/strong_runner.py` and publisher details before installation, especially because the skill uses account credentials.
