Unifi Inforjota Integration
Analysis
The skill is mostly coherent read-only UniFi monitoring, but review is warranted because its docs request high-privilege admin credentials and its helper can make broad authenticated gateway reads.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
curl -sk ... -H "X-API-KEY: $UNIFI_TOKEN" ... "$UNIFI_URL$path" ... /*) unifi_request "$endpoint" ;;
The helper sends the API key to any slash-prefixed path on the configured UniFi gateway, rather than limiting access to the documented monitoring endpoints. The same request also disables TLS certificate verification with -k.
Required binaries ... none; Env var declarations: none; Primary credential: none; Required config paths: none; No install spec — this is an instruction-only skill.
The packaged scripts rely on local shell tooling and a UniFi credential config file, but the registry metadata does not declare those requirements. This is not hidden remote code execution, but it makes the setup and credential contract less clear.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
Create a new local admin ... Note the username and password ... "username": "api", "password": "your-password-here"
This directs users to create and store UniFi local admin credentials even though the skill is described and implemented around X-API-KEY monitoring. A local admin password is broader, high-impact authority for a read-only monitoring task.
