Kagi Summarizer

PassAudited by ClawScan on May 10, 2026.

Overview

The skill appears to do what it says—summarize user-provided URLs or text with Kagi—but it uses a Kagi API key and may download a GitHub release binary if not built locally.

This looks safe to use for its stated purpose if you trust Kagi with the content you summarize and understand it may use paid API balance. Configure KAGI_API_KEY carefully, avoid sending secrets or highly sensitive documents, and verify or build the binary rather than blindly accepting an unpinned GitHub release download.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Using the skill authorizes paid Kagi API requests with the user's API balance, but the code does not show the key being logged or sent elsewhere.

Why it was flagged

The skill reads a Kagi API key from the environment and uses it only as the Authorization header for the Kagi summarizer API.

Skill content
apiKey := strings.TrimSpace(os.Getenv("KAGI_API_KEY")) ... req.Header.Set("Authorization", "Bot "+apiKey)
Recommendation

Store the Kagi API key securely, monitor API usage/balance, and use a scoped or replaceable token if Kagi provides one.

What this means

Any text piped or pasted into the tool, and any URL submitted, is shared with Kagi for processing and may consume API balance.

Why it was flagged

The skill sends the user-provided URL or raw text to Kagi's external summarization API, which is expected for this skill's stated purpose.

Skill content
const summarizerURL = "https://kagi.com/api/v0/summarize" ... reqBody := summarizeRequest{URL: inputURL, Text: inputText, ...}
Recommendation

Only summarize content you are comfortable sending to Kagi; avoid piping secrets or highly sensitive private documents, and consider using --no-cache for sensitive inputs.

What this means

A compromised or unexpected GitHub release binary could run code locally under the user's account if the user accepts the download.

Why it was flagged

If no local executable is present and it cannot build from source, the wrapper can download the latest GitHub release binary and execute it; the wrapper prompts first but does not verify a checksum itself.

Skill content
RELEASE_META="$(curl -fsSL "https://api.github.com/repos/joelazar/kagi-skills/releases/latest")" ... curl -fsSL "$URL" -o "$BIN" ... chmod +x "$BIN" ... exec "$BIN" "$@"
Recommendation

Prefer building from the included source when possible, or verify the GitHub release checksum/signature and pin a trusted release version before running the downloaded binary.