Towel Protocol

WarnAudited by ClawScan on May 10, 2026.

Overview

The trust-lookup documentation is mostly coherent, but the bundled scripts add under-disclosed GitHub repo creation, GitHub token use, and persistent inter-agent channels.

Review carefully before installing. The public API lookup behavior is low-risk, but the included scripts are much more powerful: they can use your GitHub login, create private repos, push files, and store inter-agent handshake data. Run them only manually, with a limited GitHub token and a repository/org you intentionally choose, and do not rely on the handshake as strong proof of identity without further review.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If run, the skill could create repositories and persistent collaboration channels in the user's GitHub organization.

Why it was flagged

The script can create and push to a private GitHub repository in a supplied organization, which is account mutation beyond the SKILL.md public trust-score lookup workflow.

Skill content
gh repo create "$ORG/$REPO_NAME" --private --description "TOWEL: $MY_ID ↔ $THEIR_ID trusted sidechannel" --clone ... git push --set-upstream origin main
Recommendation

Only run these scripts after explicit user approval, with a clearly selected organization/repository, and disclose this GitHub mutation capability in the skill documentation and metadata.

What this means

A local GitHub token with the user's account privileges could be reused for repo operations and exposed in local repository configuration.

Why it was flagged

The script reads the local GitHub CLI auth token and places it in the git remote URL, despite the skill metadata declaring no credential requirement.

Skill content
TOKEN=$(gh auth token 2>/dev/null) ... git remote set-url origin "https://x-access-token:${TOKEN}@github.com/$ORG/$REPO_NAME.git"
Recommendation

Declare the GitHub credential requirement, avoid embedding tokens in remote URLs, and advise users to use a least-privilege token or standard GitHub credential helper.

What this means

Agent messages, audit records, and shared context could persist in GitHub and be read or modified by parties with repository access.

Why it was flagged

The script creates an inter-agent communication channel with shared writable context, but the SKILL.md does not document access boundaries, identity checks, or containment for this channel.

Skill content
This repo is a bilateral trust channel between two AI agents. ... Each agent writes ONLY to their own directory ... shared/ is updated by either agent after mutual interactions
Recommendation

Document the channel model, who can access it, what data may be written, and how write permissions and trust boundaries are enforced.

What this means

Users or agents may treat another agent as verified based on a weak or poorly bounded handshake mechanism.

Why it was flagged

The script stores handshake seeds in the repo and then presents a successful hash match as identity confirmation; this may overstate the strength of verification, especially if repo readers can access seed material.

Skill content
"seed": "$SEED" ... "Never share outside this repo." ... echo "✅ VERIFIED: $AGENT_ID identity confirmed"
Recommendation

Avoid strong trust claims unless the protocol clearly protects secrets, authenticates parties, and explains the limitations of the verification result.