R2 Storage

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill mostly matches Cloudflare R2 storage management, but some scripts can execute a local env file as shell code and may operate on an unexpected hard-coded bucket.

Review and preferably edit the scripts before use: remove the source of ~/.config/r2/env, make the bucket explicit or load it from R2_CONFIG, use least-privilege Cloudflare R2 tokens, avoid printing secrets in shared contexts, and use dry-run/confirmation for sync or delete operations.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

If that local env file is malformed or poisoned, running the credential display helper could run unintended commands on the user's machine.

Why it was flagged

The script executes the contents of ~/.config/r2/env as shell code rather than parsing it as data. That file is not created by setup.sh and is not documented in SKILL.md as trusted executable code.

Skill content
if [[ -f "$ENV_FILE" ]]; then
    source "$ENV_FILE"
Recommendation

Do not source configuration files for this purpose. Parse key/value data safely, document the file format, and restrict permissions on any credential file.

What this means

A user or agent could delete data from the wrong R2 bucket if the environment variable is not set exactly as the script expects.

Why it was flagged

Deletion defaults to a hard-coded bucket name when R2_BUCKET is not set, while the skill documentation asks users to provide a bucket in R2_CONFIG. This can target an unexpected bucket.

Skill content
BUCKET="${R2_BUCKET:-moltbot-storage}"
...
rclone delete "${REMOTE}:${BUCKET}/${PATH}"
Recommendation

Read the bucket from the documented R2_CONFIG/config file, require an explicit bucket for destructive actions, and add confirmation for per-path deletes.

What this means

Anyone who can see the command output may be able to use the R2 token according to its Cloudflare permissions.

Why it was flagged

The skill includes a helper that prints the R2 secret access key. This is disclosed as a credential helper, but it exposes a high-value credential to the terminal or agent transcript.

Skill content
echo "R2_SECRET_ACCESS_KEY=$SECRET_KEY"
...
echo "Secret Key:"
echo "  $SECRET_KEY"
Recommendation

Use least-privilege R2 tokens, avoid running show-creds in shared logs or chats, and rotate the token if it is exposed.

What this means

Installing this way trusts the remote installer and network path with administrative access to the machine.

Why it was flagged

The install instructions run a remotely downloaded script with sudo. This is a common rclone installation pattern and is disclosed, but it gives the installer root-level authority.

Skill content
curl -fsSL https://rclone.org/install.sh | sudo bash
Recommendation

Prefer a trusted package manager or inspect the installer before running it, and only approve the privileged install if needed.