embedded-engineer

PassAudited by ClawScan on May 10, 2026.

Overview

This instruction-only embedded engineering skill appears purpose-aligned, but its sample IoT code includes hardcoded placeholder credentials and insecure network/OTA patterns that should be hardened before real deployment.

This skill is reasonable to install as an instruction-only embedded engineering reference. Treat the included code as educational, not production-ready: replace placeholder credentials, secure MQTT with TLS/authentication, and use signed HTTPS OTA updates before deploying anything to real hardware.

Findings (3)

Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.

What this means

If copied unchanged into a real project, users may normalize storing Wi-Fi passwords directly in firmware.

Why it was flagged

The example includes a hardcoded Wi-Fi credential-looking value. It appears illustrative and purpose-aligned for embedded networking code, but hardcoding real credentials would be unsafe.

Skill content
const char* ssid = "IoT_Network";
const char* password = "SecurePassword123";
Recommendation

Replace placeholders with secure configuration handling, avoid committing real secrets, and document credential storage best practices.

What this means

A copied deployment could expose device commands or telemetry to parties that can reach the broker/topic namespace.

Why it was flagged

The example uses a public MQTT broker on the common plaintext port and subscribes to command/config topics. This is relevant to IoT examples, but real deployments need authentication, authorization, TLS, and topic isolation.

Skill content
const char* mqtt_server = "broker.hivemq.com";
const int mqtt_port = 1883;
...
mqtt.subscribe("iot/devices/ESP32_SENSOR_001/commands");
mqtt.subscribe("iot/devices/ESP32_SENSOR_001/config");
Recommendation

Use a private or authenticated broker, TLS, per-device credentials, restricted topics, and explicit command validation before deploying similar code.

What this means

If adapted directly, a device could install firmware from an unauthenticated or tampered update source.

Why it was flagged

The reference firmware example demonstrates downloading and applying OTA updates from a remote URL over HTTP. OTA updates are expected for IoT examples, but unsecured firmware update paths are high-impact if reused without verification.

Skill content
http.begin("http://update.server.com/firmware/latest.json");
...
t_httpUpdate_return ret = httpUpdate.update(client, url);
Recommendation

Require HTTPS, signed firmware, version/rollback checks, trusted update metadata, and user or fleet-policy approval for OTA updates.