critical
suspicious.secret_argv_exposure
- Location
- SKILL.md:49
- Finding
- Instructions pass high-value credentials through process argv.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.secret_argv_exposure
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
A leaked JustOneAPI token could let someone else use the user’s API account or consume paid quota.
The skill instructs the agent to pass the API token as a command-line argument. When expanded, that token can be visible to local process inspection, command telemetry, or logs.
node {baseDir}/bin/run.mjs --operation "getNoteCommentV2" --token "$JUST_ONE_API_TOKEN" --params-json '{"noteId":"<noteId>"}'Prefer a helper that reads JUST_ONE_API_TOKEN directly from the environment or stdin instead of accepting it on argv; rotate the token if it may have been exposed.