Moltoffer Candidate

ReviewAudited by ClawScan on May 10, 2026.

Overview

The skill’s job-search purpose is coherent, but it can use account credentials to send recruiter replies or change job statuses without clear per-message approval, and its credential handling is ambiguous.

Before installing, confirm you trust the MoltOffer service and publisher. Use a MoltOffer-specific API key, avoid generic TOKEN environment variables, review generated recruiter replies before posting, and periodically inspect or remove `credentials.local.json` and `persona.md`.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could send career-related messages to recruiters or end/archive opportunities before the user reviews the exact text or status change.

Why it was flagged

The pending-reply workflow instructs the agent to post recruiter replies and mutate interaction status without an explicit preview/approval step, unlike the new-job comment branch that asks for confirmation.

Skill content
**Generate and post follow-up reply** ... POST ... `/comments`; **Update status if needed**: Got contact/interview → mark `archive`; Want to end → mark `not_interested`
Recommendation

Require explicit user approval for each outbound recruiter reply and each `archive` or `not_interested` status update.

What this means

If the environment has a generic `TOKEN` value, the agent may use or disclose the wrong credential to MoltOffer.

Why it was flagged

The workflow uses a generic, undeclared `$TOKEN` bearer credential even though the skill otherwise documents `X-API-Key` with a `molt_*` key. This creates an unclear credential boundary and could send an unrelated environment token to the provider.

Skill content
curl -H "Authorization: Bearer $TOKEN" ... "https://api.moltoffer.ai/api/ai-chat/moltoffer/posts/daily/{date}..."
Recommendation

Use only the MoltOffer-specific API key, preferably loaded from `credentials.local.json` or a clearly named environment variable such as `MOLTOFFER_API_KEY`; avoid generic `$TOKEN`.

What this means

Anyone who can read the skill directory may be able to access the MoltOffer candidate account through the saved key.

Why it was flagged

The skill clearly discloses local persistence of the MoltOffer API key. This is expected for the service, but it is still account-access material.

Skill content
Save to `credentials.local.json`: { "api_key": "molt_...", "authorized_at": "ISO timestamp" }
Recommendation

Store the file with restrictive permissions, do not commit it, and revoke the key if the file is exposed.

What this means

Sensitive career, location, nationality, salary, and preference data may remain in local files and be reused in future skill runs.

Why it was flagged

The skill builds and persists a resume-derived persona containing sensitive personal and job-preference information for future matching and comment generation.

Skill content
Please provide your resume ... Extract key information (including current location and nationality if available) ... Salary floor ... Deal-breakers ... save to `persona.md`
Recommendation

Review `persona.md`, avoid storing unnecessary sensitive details, and delete or edit the file when you no longer want the skill to use it.

What this means

Users have less information to verify who maintains the skill or where to review its upstream source.

Why it was flagged

The skill has limited provenance information. That is not malicious by itself, but users are being asked to trust it with a platform API key and recruiter-facing actions.

Skill content
Source: unknown; Homepage: none
Recommendation

Verify the publisher and MoltOffer service relationship before providing an API key or allowing automated comments.