Amazon Ads Entity

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.exposed_secret_literal

Findings (9)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A broad query may retrieve thousands of advertising records from the selected account profile.

Why it was flagged

The skill can automatically page through a large number of Amazon Ads entities. This is disclosed and read-only, but users should understand the breadth of data retrieval.

Skill content
fetchAll=true(默认)跟随分页 token 到结束或 maxPages=50 兜底(约 5000 条,超出标 truncated=true)
Recommendation

Use campaign, ad group, state, ASIN, or SKU filters when possible, and check the `truncated` flag in results.

What this means

Whoever runs the skill with this key can read Amazon Ads entity metadata for authorized profiles.

Why it was flagged

The skill requires a LinkFox API key to access Amazon Ads token/profile functions. This is purpose-aligned, but it is sensitive credential use and the registry requirements list no required env vars or primary credential.

Skill content
鉴权:环境变量 `LINKFOXAGENT_API_KEY`
Recommendation

Set `LINKFOXAGENT_API_KEY` only in a trusted environment, verify the authorized Amazon Ads profiles, and prefer registry metadata that explicitly declares this credential requirement.

What this means

Your API key, Amazon Ads token, profile ID, and query body may be sent to the configured gateway endpoint.

Why it was flagged

Requests, profile IDs, and Amazon Ads access tokens are sent through a LinkFox gateway, and an environment variable can override the gateway base URL. This is coherent with the integration, but it is a sensitive data boundary.

Skill content
API_BASE_URL = os.environ.get("AMAZON_ADS_BASE_URL") or "https://tool-gateway.linkfox.com" ... "amzAccessToken": access_token
Recommendation

Use the default gateway only if you trust LinkFox with this integration, and do not set `AMAZON_ADS_BASE_URL` to an untrusted endpoint.

What this means

Using the skill may require adding another skill that handles Amazon Ads authorization.

Why it was flagged

The skill depends on a separate auth skill and suggests installing it when missing. This dependency is disclosed and purpose-aligned, but installing an auth-related skill should be user-approved and trusted.

Skill content
invoke it to install 'linkfox-amazon-ads-auth' immediately
Recommendation

Install `linkfox-amazon-ads-auth` only from a trusted source and after confirming that you want this Amazon Ads authorization dependency.

Findings (9)

critical

suspicious.exposed_secret_literal

Location
scripts/sb/list_ad_groups.py:71
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sb/list_ads.py:74
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sb/list_campaigns.py:71
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sp/list_ad_groups.py:71
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sp/list_campaigns.py:70
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sp/list_keywords.py:74
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sp/list_negative_keywords.py:69
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sp/list_product_ads.py:96
Finding
File appears to expose a hardcoded API secret or token.
critical

suspicious.exposed_secret_literal

Location
scripts/sp/list_targets.py:69
Finding
File appears to expose a hardcoded API secret or token.