soulmd-newsletter
Analysis
The skill appears to only fetch and show a public newsletter, with a small local state file and a packaging inconsistency users should verify.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
RSS_URL = "https://buttondown.com/soulmd/rss" ... urllib.request.urlopen(req, timeout=10)
The skill performs an outbound HTTP request to the disclosed newsletter RSS feed. This is central to the stated purpose and no unrelated endpoint or credential use is shown.
**File 2: Inside `soul-md`, create a folder called `scripts`, then create `fetch_latest.py` with this content:** ... print(f"TITLE: {latest['title']}The script file is not a clean Python file; it includes markdown instructions and appears incomplete, while SKILL.md contains a separate complete script. This creates packaging ambiguity, though not evidence of malicious behavior.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
STATE_FILE = Path.home() / ".openclaw" / "soul-md-state.json" ... save_state({"last_seen_link": latest["link"], "last_checked": datetime.utcnow().isoformat()})The optional new-edition check persists the last seen newsletter link and a timestamp in the user's home directory. The stored data is limited and purpose-aligned, but it is persistent local state.
