suspicious.secret_argv_exposure
- Location
- SKILL.md:42
- Finding
- Instructions pass high-value credentials through process argv.
AdvisoryAudited by Static analysis on May 10, 2026.
Detected: suspicious.secret_argv_exposure
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
On a shared or monitored machine, another local user, process, or log collector could capture the JustOneAPI token and use it outside this skill.
This directs the helper to receive the provider token through process argv. The token is purpose-aligned, but command-line arguments may be visible to local process inspection, shell/debug tooling, or command telemetry.
node {baseDir}/bin/run.mjs --operation "searchZhihuV1" --token "$JUST_ONE_API_TOKEN" --params-json '{"keyword":"<keyword>"}'Prefer a version that reads JUST_ONE_API_TOKEN directly from the environment or stdin instead of argv; if used, run only on trusted machines and rotate the token if exposure is suspected.