OfficeX

WarnAudited by ClawScan on May 10, 2026.

Overview

This instruction-only OfficeX API skill is not malware, but it documents broad financial, account, and full-admin API access without clear guardrails, so it needs careful review before use.

Only use this skill with test or least-privileged OfficeX credentials unless you fully trust the source. Do not provide superadmin secrets casually. Confirm every action that changes billing, wallets, installs, app publication, keys, or account data before letting an agent make API calls.

Findings (5)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If an agent used a superadmin secret, it could affect the entire OfficeX system rather than just the user's own account or app.

Why it was flagged

The skill documents a full-system admin credential, which is much broader than normal end-user or app-developer access and is not declared in the registry credential metadata.

Skill content
Superadmin | `x-officex-admin-secret` | Full system (`/admin/*`)
Recommendation

Do not provide admin secrets unless you are an authorized OfficeX administrator. The skill should separate admin-only documentation from consumer/developer workflows and clearly declare required credentials and scopes.

What this means

An agent following this skill could spend or move credits, change installations, publish apps, or modify account state if given credentials and HTTP tooling.

Why it was flagged

The skill is intended to guide broad REST API calls, including financial and account-mutating actions, but the provided artifact does not show clear approval boundaries for those high-impact operations.

Skill content
Use when: (1) Making HTTP calls to OfficeX cloud API, (2) Building or publishing apps on the platform, (3) Implementing billing (reserve/settle/sip/payout), (4) Managing users, installs, wallets
Recommendation

Use only with explicit user approval for each mutating or financial request. Prefer staging first, set spending limits, and use the least-privileged credential available.

What this means

Master keys and install secrets could allow account changes or billing actions if exposed or used incorrectly.

Why it was flagged

The skill requires handling account and billing credentials, while the registry metadata lists no required environment variables or primary credential.

Skill content
Master Key | `x-officex-user-id` + `x-officex-master-key` | Profile, installs, wallets, vendor apps ... Install Secret | `x-officex-install-id` + `x-officex-install-secret` | Billing: reserve, settle, cancel, inbox
Recommendation

Store OfficeX credentials securely, rotate them if exposed, and avoid pasting broad master keys into chats unless absolutely necessary.

What this means

Stored context could shape later agent responses or actions, especially if it contains incorrect or hostile instructions.

Why it was flagged

The skill references stored agent context and context prompts, which are purpose-aligned for an AI integration but may influence future agent behavior if untrusted content is written or reused.

Skill content
Integrating with the AI chat agent (agent_context, documentation, context_prompt) ... PATCH  /users/me/installs/{id}/context  { key: val | null } → { agent_context }
Recommendation

Review any agent_context or context_prompt values before storing or reusing them, and avoid treating remote app-provided context as automatically trustworthy.

What this means

Users may not be able to easily verify that this OfficeX API guidance was published by an official or trusted source.

Why it was flagged

The skill has no code installation risk, but its provenance is unclear for a credentialed cloud API integration.

Skill content
Source: unknown; Homepage: none
Recommendation

Confirm the skill publisher and OfficeX documentation independently before using real credentials or production accounts.