tuoluo-company-api

WarnAudited by ClawScan on May 10, 2026.

Overview

This skill mostly matches its stated company API purpose, but it handles company credentials, can create business records, and contains unsafe argument handling that could run unintended local code.

Do not enter real company credentials until you trust the script source. If you use it, prefer a limited-permission account, protect the generated config/token files, and require explicit confirmation before any create/add commands are run.

Findings (4)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

A maliciously crafted command argument could cause the skill to run unintended code on the user's machine.

Why it was flagged

User/config-controlled values are interpolated directly into a Python program executed with python3 -c instead of being passed as data, so crafted project/task names or IDs could alter the Python code that runs locally.

Skill content
body=$(python3 -c " ... adm = json.loads('$admin_template') ... 'name': '$name', ... 'uid': $uid, ... ")
Recommendation

Generate JSON safely by passing arguments through stdin, environment variables, argparse, or jq; never interpolate untrusted values into python -c source code.

What this means

An agent using this skill could create projects, tasks, or products in the company system, potentially causing incorrect business records.

Why it was flagged

The skill exposes commands that mutate company/business data, while the high-level description emphasizes querying company data and the artifacts do not document approval, confirmation, or rollback controls.

Skill content
`project-add` ... 创建项目; `task-add` ... 创建项目任务; `product-add` ... 添加产品
Recommendation

Separate read-only and write-capable commands, require explicit user confirmation before mutations, document needed roles/scopes, and provide rollback or audit guidance.

What this means

Installing and configuring the skill gives it ongoing access to internal company data and any actions allowed by the supplied account.

Why it was flagged

The skill requires platform API credentials and a user login password and persists them/tokens locally, but registry metadata declares no primary credential, env vars, or capability tags.

Skill content
首次运行 `setup` 命令,按提示输入 ... 开放平台 access_key / secret_key ... 登录手机号 + 密码 ... `.api-config.json` 和 `.token-cache.json` 包含敏感信息
Recommendation

Use a least-privilege service account if possible, store secrets in a credential manager or protected environment variables, restrict file permissions, and clearly declare credential requirements in metadata.

What this means

Users have less registry-level context for verifying where the code came from and what local tools it expects.

Why it was flagged

The skill is credential-handling and script-based, but provenance is not provided and the documented jq/curl/python3 dependencies are not reflected in registry requirements.

Skill content
Source: unknown; Homepage: none; Required binaries: none
Recommendation

Verify the script source before entering credentials, and update metadata to declare dependencies, credentials, and a trustworthy homepage/source.