Env credential access
- Finding
- Environment variable access combined with network send.
Security checks across static analysis, malware telemetry, and agentic risk
The skill appears to perform the advertised AWEKAS weather lookup, but users should know it uses an AWEKAS API key and a third-party fetch dependency.
This looks reasonable for a weather API skill. Install it if you are comfortable providing an AWEKAS API key to the AWEKAS endpoint, and verify the package/version if using it in a sensitive environment.
VirusTotal findings are pending for this skill version.
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
The user's AWEKAS API key will be used for requests to api.awekas.at.
The skill uses an AWEKAS API key from a command argument or environment variable and sends it to the AWEKAS API. This is purpose-aligned, but it is still a credential boundary users should understand.
const apiKey = args.key || process.env.AWEKAS_KEY; ... url.searchParams.set("key", apiKey);Use a dedicated AWEKAS key if possible, avoid sharing it in prompts or logs, and revoke/rotate it if it is exposed.
Users may have less certainty about the exact dependency version or package version identity being installed.
The package uses a third-party dependency with a version range, and the submitted registry metadata lists version 1.0.0 while the included package/SKILL files list 2.0.0. This is a provenance/install hygiene note, not evidence of malicious behavior.
"version": "2.0.0", ... "dependencies": { "node-fetch": "^3.3.2" }Verify the package source/version before installing in sensitive environments and prefer locked dependency versions where possible.