Fing Local API
Analysis
This is a coherent read-only Fing Local API helper, but it uses an API key and can reveal private network inventory and presence data.
Findings (3)
Artifact-based informational review of SKILL.md, metadata, install specs, static scan signals, and capability signals. ClawScan does not execute the skill or run runtime probes.
Checks for instructions or behavior that redirect the agent, misuse tools, execute unexpected code, cascade across systems, exploit user trust, or continue outside the intended task.
Raw API wrapper for debugging ... devices --raw ... Do not expose full MAC/IP/name inventories outside Igor's direct context.
The skill can retrieve detailed inventory data, including raw responses, and the documentation acknowledges that full MAC/IP/name inventories are sensitive.
Checks whether tool use, credentials, dependencies, identity, account access, or inter-agent boundaries are broader than the stated purpose.
parser.add_argument("--api-key", default=os.getenv("FING_API_KEY")); params = urllib.parse.urlencode({"auth": api_key})The helper requires a Fing API key and sends it as the Local API authentication parameter. This is purpose-aligned, but the key grants access to private local network data.
Checks for exposed credentials, poisoned memory or context, unclear communication boundaries, or sensitive data that could leave the user's control.
"name": d.get("name") ... "displayName": (p.get("contactInfo") or {}).get("displayName")Device names and contact display names from the local network are placed into the agent's context. These fields should be treated as data, not as instructions.
