Clawback
Analysis
This skill appears purpose-aligned, but it can store broker credentials, place real-money trades automatically, and run as a background service, so it needs careful review before installation.
Findings (6)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
`/clawback run` | Start trading bot: Execute `{baseDir}/bin/clawback.py run` ... `executes scaled positions in your E*TRADE brokerage account`The skill is designed to turn an agent command into automated broker execution, which can place financial trades from the user's account.
`/clawback daemon` | Run as background service ... `Disclosure Checks | 10:00, 14:00, 18:00 ET`
The artifacts document a background service mode and scheduled checks, meaning the skill can keep operating after the initial command.
`Real-time disclosure tracking` from official House Clerk and Senate eFD sources ... `Automated trade execution` via E*TRADE API
The workflow connects externally parsed disclosure data directly to trading execution, so bad data, parsing mistakes, or misconfiguration could propagate into broker actions.
Check if `{baseDir}/venv` exists. If not, run: `cd {baseDir} && python3 -m venv venv && source venv/bin/activate && pip install -e .`Setup runs local Python packaging commands. This is normal for a Python CLI skill, but it executes package installation logic from the skill directory.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Create/update `~/.clawback/config.json` ... `credentials`: { `apiKey`: `<consumer_key>`, `apiSecret`: `<consumer_secret>` } ... `production` (real money)The skill needs broker credentials and account access for its stated purpose, but these credentials are sensitive and enable high-impact account actions.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
`notifications`: { `telegram`: { `enabled`: true, `useOpenClaw`: true } }The default setup enables Telegram/OpenClaw notification integration, which may send trade-related events outside the local machine.
