Selection Agent

WarnAudited by ClawScan on May 18, 2026.

Overview

This skill fits a marketing research use case, but it asks the agent to read hardcoded local tokens and run unreviewed code from a /tmp project before doing the work.

Review the referenced /tmp project, AGENT_CONFIG.md, and scripts before use. Remove hardcoded shared tokens, declare required credentials in metadata, use least-privilege keys, and require explicit user approval before running the script or accessing Ads, Sheets, Notion, Gemini, Semrush, or MySQL.

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

The agent could load and use sensitive API keys, OAuth access, and database credentials that may affect third-party accounts or internal data.

Why it was flagged

The skill directs the agent to read a local file containing all tokens and to use multiple service, OAuth, and database credentials, but the artifacts do not bound their scope or declare them in the metadata.

Skill content
执行前必须读取: `/tmp/powerful-trendplus/AGENT_CONFIG.md` ... 写死了所有 Token ... `FB_ADS_TOKEN` ... `NOTION_API_KEY` ... `GEMINI_API_KEY` ... Google Workspace ... OAuth ... MySQL ... 数据库凭证
Recommendation

Do not use until credentials are explicitly declared, least-privilege scoped, and only accessed after user approval; avoid putting all tokens in a file the agent must read.

What this means

Installing or invoking the skill may cause the agent to run unreviewed local code with access to loaded credentials.

Why it was flagged

The skill tells the agent to execute a Python script from an absolute /tmp directory; the supplied package contains no reviewed code or install spec for this script, so the executed code provenance is outside the reviewed artifacts.

Skill content
cd /tmp/powerful-trendplus
source .env.local 2>/dev/null
python3 scripts/run_full_research.py
Recommendation

Verify the referenced repository and script contents, pin the source/version, include the code in the reviewed package, and require explicit confirmation before execution.