Create Web Form
PassAudited by ClawScan on May 12, 2026.
Overview
This is an instruction-only web form reference skill with no install or runtime code; the main thing to watch is that generated forms may handle passwords, payment tokens, or other sensitive data.
This skill appears safe to install as documentation/reference material. Be careful when using it to generate login, checkout, upload, database, or API-backed forms: inspect the output, keep secrets out of source code, use HTTPS, validate on the server, and avoid handling raw payment data unless you have the proper secure infrastructure.
Findings (1)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If a user asks this skill to create login, checkout, or account forms, the resulting code could handle sensitive user data and must be implemented securely.
The skill may guide generation of forms that handle passwords, payment data, or secrets. This is purpose-aligned for a web form skill and the text includes safer handling guidance, but users should recognize the sensitivity before deploying generated code.
Collect passwords or payment data only when necessary; hash passwords server-side and prefer hosted payment fields or tokenization from a trusted processor
Review any generated form before deployment, avoid raw payment-card handling, use trusted payment tokenization, hash passwords server-side, and keep real secrets in environment variables or a secret manager.
