TickTick CLI
Analysis
This is a coherent TickTick task-management CLI, but it grants and stores TickTick OAuth access, so users should protect the credential file and review write commands.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
.command("batch-abandon <taskIds...>") ... .description("Abandon multiple tasks in a single API call")The CLI exposes write operations, including a bulk task-status change. This matches the stated task-management purpose, but accidental or overly broad agent use could change multiple tasks.
Source: unknown; Homepage: none
The registry metadata does not identify an upstream source or homepage, which reduces provenance transparency even though the supplied code is coherent.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Tokens are stored in `~/.clawdbot/credentials/ticktick-cli/config.json` ... Credentials are stored in plaintext.
The skill persistently stores TickTick OAuth client credentials and tokens locally. This is disclosed and purpose-aligned, but the file represents sensitive account access.
