critical
suspicious.secret_argv_exposure
- Location
- SKILL.md:43
- Finding
- Instructions pass high-value credentials through process argv.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.secret_argv_exposure
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
If the token is exposed, someone else may be able to use the user's JustOneAPI account or quota.
The skill instructs use of a sensitive API token through a command-line argument; after shell expansion, that token can be visible to process-list tools or local monitoring on some systems.
node {baseDir}/bin/run.mjs --operation "getNoteSubCommentV2" --token "$JUST_ONE_API_TOKEN" --params-json '{"noteId":"<noteId>","commentId":"<commentId>"}'Prefer a helper that reads JUST_ONE_API_TOKEN directly from the environment or a secret store instead of argv; avoid using this on shared machines and rotate the token if exposure is suspected.