Discord Connect UI

AdvisoryAudited by Static analysis on May 10, 2026.

Overview

Detected: suspicious.dangerous_exec

Findings (2)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

Installing it can change how your local Clawdbot gateway and dashboard behave, and a failed or incorrect modification could break the service.

Why it was flagged

The installer writes backend and RPC registration changes into an auto-detected Clawdbot source tree, giving the skill high-impact local mutation authority.

Skill content
const backendDest = path.join(gatewayPath, "src/gateway/server-methods/discord-connect.ts"); copyFile(backendSrc, backendDest); ... writeFile(serverMethodsPath, serverMethods);
Recommendation

Review the installer first, run it with --dry-run, pass an explicit --gateway-path, keep your own backup, and consider using --skip-build and --skip-restart until you are ready.

ConcernHigh Confidence
ASI05: Unexpected Code Execution
What this means

A normal package installation path could execute local code that changes and rebuilds Clawdbot, rather than only installing passive skill instructions.

Why it was flagged

The package install lifecycle is wired to run the installer script, which the provided code shows can modify source files and run build/restart commands.

Skill content
"scripts": { "install": "node scripts/install-plugin.js", "uninstall": "node scripts/install-plugin.js --uninstall", "health": "python3 scripts/health-check.py", "test-token": "python3 scripts/test-token.py" }
Recommendation

Do not install it through package lifecycle scripts unless you intend those changes; invoke the installer manually after review and with restrictive flags.

What this means

Anyone with the bot token can act as that Discord bot within the permissions you granted it.

Why it was flagged

A Discord bot token is required and gives the integration delegated access to the bot's Discord servers; this is expected for the skill but sensitive.

Skill content
"botToken": { "type": "string", "description": "Discord bot token. Can be a direct token or OpenBao reference (bao:path#key)", "pattern": "^(bao:|[A-Za-z0-9_.-]+).*$", "minLength": 1 }
Recommendation

Use a dedicated bot token with the minimum Discord permissions needed, prefer OpenBao or another secret store, and rotate the token if it is exposed.

What this means

It is harder to know exactly what will run, where it came from, and whether the platform will manage or constrain the install behavior.

Why it was flagged

For a skill that contains installer code, source-modifying hooks, and shell build execution, the registry-level provenance and install/capability contract are under-declared.

Skill content
Source: unknown; Homepage: none; No install spec — this is an instruction-only skill.; Capability signals: No capability tags were derived.
Recommendation

Treat the installer as untrusted local code unless you can verify its origin and review all files; the registry should declare install behavior, credentials, and capabilities explicitly.

What this means

A user may trust the install to be easily reversible when the provided installation path may still overwrite working source files.

Why it was flagged

The package presents automatic backups as a mitigation for high-impact source edits, but the visible installer helpers copy/write files directly, so users should not rely on the backup claim without verifying it.

Skill content
"source_modification": { "description": "Modifies Clawdbot source files to install UI components and handlers", "mitigation": "Creates backups before modification; provides uninstall script" }
Recommendation

Create your own backup or version-control checkpoint before running the installer, and verify any uninstall/restore procedure before relying on it.

Findings (2)

critical

suspicious.dangerous_exec

Location
assets/install-hooks.js:247
Finding
Shell command execution detected (child_process).
critical

suspicious.dangerous_exec

Location
scripts/install-plugin.js:318
Finding
Shell command execution detected (child_process).