Clawhub Publish Workflow

ReviewAudited by ClawScan on May 13, 2026.

Overview

The workflow mostly matches ClawHub publishing, but it handles publishing credentials unsafely and relies on missing or mismatched helper scripts for required security checks.

Review this skill before use. Do not store API tokens in memory/credentials.md; use a proper secret mechanism and a least-privilege token. Verify or replace the missing/mismatched helper scripts before running scans, and require explicit user approval before any ClawHub publish command.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The security check may fail, give false assurance, or cause the user/agent to execute a different local script than the one reviewed here.

Why it was flagged

The workflow makes this security scanner a required pre-publish gate, but the provided file manifest does not include guard_scanner.py. SKILL.md also calls evaluator.py while the included evaluator file is named SKILL_EVALUATOR.py. This can make users run missing or unintended local code before publishing.

Skill content
python3 guard_scanner.py <skill-path> --json ... Must return CLEAN before continuing
Recommendation

Bundle the referenced scanner and use matching filenames, or document a pinned, trusted installation source and hash. Until then, do not treat the required scan step as reviewed.

What this means

A ClawHub token stored this way could be exposed to future agent tasks, copied into published content, or reused without the user's intent.

Why it was flagged

The reference recommends persisting a ClawHub API token in a memory/markdown credentials file. That is sensitive credential material stored in persistent agent-readable context without clear access controls or retention boundaries.

Skill content
Store in: `memory/credentials.md` ... - **Clé API:** `clh_...`
Recommendation

Use a secret manager, environment variable, or ClawHub’s normal credential mechanism instead of persistent memory files. Declare the credential requirement and avoid storing raw tokens in shared context.

What this means

If the token is broad or mishandled, an agent could publish or inspect skills under the user's account.

Why it was flagged

Publishing to ClawHub reasonably requires account authentication, but this gives the workflow delegated authority over the user's ClawHub account.

Skill content
clawhub login --token <token> --no-browser
Recommendation

Use a least-privilege, revocable token and provide it only when publishing is intended.

What this means

A mistaken path, slug, version, or changelog could publish the wrong skill or expose unintended content.

Why it was flagged

The publish command is central to the skill's purpose, but it is a high-impact action that can create public or account-visible content.

Skill content
clawhub publish <path> --slug <slug> --name "<名称>" --version 1.0.0 --changelog "<更改内容>"
Recommendation

Require an explicit user confirmation after reviewing the final package contents, slug, version, and account before running publish.

What this means

Users may assume the tool is portable and impersonal when it may fail, read/write unexpected paths, or encourage environment-specific content.

Why it was flagged

The bundled evaluator contains environment-specific names and paths even though the workflow describes itself as generic for any OpenClaw agent.

Skill content
AGENT_NAME = "Morgana"
SKILL_DIR = Path("/media/ezekiel/Morgana/skills")
Recommendation

Replace hardcoded personal paths with relative paths or user-supplied arguments, and align the evaluator with the generic publishing guidance.