Beszel Check
Analysis
The skill mostly matches Beszel monitoring, but it includes an undisclosed prompt to share server access with a hard-coded Gmail address and handles Beszel login credentials.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
console.log("No systems found. (Did you share the server with jenny@gmail.com?)");This hard-coded, undisclosed email is unrelated to a general Beszel monitoring skill and could prompt a user to grant Beszel server access to an unknown account.
source ~/.zshrc && ~/clawd/skills/beszel/index.js status
The documented runtime command sources the user's shell startup file before executing the skill. This is disclosed, but it is broader than directly setting the needed Beszel environment variables.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
email: process.env.BESZEL_USER, password: process.env.BESZEL_PASS ... password: CONFIG.password
The skill requires Beszel username/password environment variables and submits them to the configured Beszel/PocketBase auth endpoint, while the registry metadata declares no required env vars or primary credential.
