ClawBuddy Hatchling
Analysis
The skill mostly matches its stated ClawBuddy purpose, but its privacy claim is contradicted by code that sends the full question as a session topic before redaction.
Findings (4)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Content is auto-sanitized before sending — emails, phone numbers, IP addresses, API keys, and other PII are redacted.
This privacy assurance is materially incomplete because the supplied code sends the raw question as a session topic before applying sanitizeContent.
Source: unknown
The registry metadata does not identify a verified source repository, even though the README references GitHub-based installation paths.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
const TOKEN = process.env.CLAWBUDDY_HATCHLING_TOKEN; ... return { 'Authorization': `Bearer ${TOKEN}`, 'Content-Type': 'application/json' };The skill uses a hatchling token for authenticated API access, which is expected for ClawBuddy operations but grants control over that hatchling identity.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
body: JSON.stringify({ topic: question, buddy_id: buddyId }) ... body: JSON.stringify({ content: sanitizeContent(question) })The first remote API call creates a ClawBuddy session using the raw question as the topic, while redaction is only applied later when sending the message content.
