zentao

PassAudited by ClawScan on May 1, 2026.

Overview

The skill is consistent with its stated ZenTao CLI purpose, but users should notice that it installs a global npm CLI and stores ZenTao login credentials locally.

This appears safe for its stated purpose if you trust the npm package and intend the agent to access ZenTao. Before installing, confirm the package source, use a least-privileged ZenTao account, and remember that the login workflow stores credentials under the local ZenTao config directory.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent may be able to use the user's ZenTao account to view products, bugs, and bug details, and the login credentials may remain on the machine after setup.

Why it was flagged

The skill requires ZenTao account credentials and stores them locally for later CLI use; this is expected for the stated login/query purpose, but it is sensitive account access.

Skill content
zentao login ... --zentao-account="leo" ... --zentao-password="***" ... This writes credentials to: ~/.config/zentao/config.toml
Recommendation

Use the least-privileged ZenTao account suitable for the task, verify the config file permissions, and remove or rotate stored credentials if the skill is no longer needed.

What this means

Installing the package adds a global command to the local environment, so trust in the npm package matters.

Why it was flagged

The skill instructs installation of a global npm package that supplies the zentao CLI. This is disclosed and central to the purpose, but it depends on external package provenance.

Skill content
pnpm i -g @leeguoo/zentao-mcp
Recommendation

Install from the expected npm package page, consider pinning or reviewing the package version, and install in an environment appropriate for company issue-tracker access.